Description
The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201709-23
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208221
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3971
Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1039307
Vendor Advisory x_refsource_confirm
http://www.tcpdump.org/tcpdump-changes.txt
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHEA-2018:0705
Scores
CVSS v3
9.8
EPSS
0.0206
EPSS Percentile
84.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
tcpdump/tcpdump
< 4.9.1
Published
Sep 14, 2017
Tracked Since
Feb 18, 2026