Description
The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201709-23
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208221
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3971
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1039307
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc
Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/35d146b7a66496d72cdeb95ccb33ab80a265ce90
Vendor Advisory x_refsource_confirm
http://www.tcpdump.org/tcpdump-changes.txt
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHEA-2018:0705
Scores
CVSS v3
9.8
EPSS
0.0206
EPSS Percentile
84.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
tcpdump/tcpdump
< 4.9.1
Published
Sep 14, 2017
Tracked Since
Feb 18, 2026