CVE-2016-7993

A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
Configurations

Configuration 1 (hide)

cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:35

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html', 'name': 'https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html', 'tags': ['Issue Tracking', 'Mailing List', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html -

Information

Published : 2017-01-28 01:59

Updated : 2023-12-10 12:01


NVD link : CVE-2016-7993

Mitre link : CVE-2016-7993

CVE.ORG link : CVE-2016-7993


JSON object : View

Products Affected

tcpdump

  • tcpdump
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer