Description
The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
References (7)
Core 7
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201709-23
Vendor Advisory x_refsource_confirm
https://support.apple.com/HT208221
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3971
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1039307
Vendor Advisory x_refsource_confirm
http://www.tcpdump.org/tcpdump-changes.txt
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHEA-2018:0705
Scores
CVSS v3
7.5
EPSS
0.0114
EPSS Percentile
78.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (1)
tcpdump/tcpdump
< 4.9.1
Published
Sep 14, 2017
Tracked Since
Feb 18, 2026