CVE-2017-5342

In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
Configurations

Configuration 1 (hide)

cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:49

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html', 'name': 'https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html', 'tags': ['Issue Tracking', 'Mailing List', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html -

Information

Published : 2017-01-28 01:59

Updated : 2023-12-10 12:01


NVD link : CVE-2017-5342

Mitre link : CVE-2017-5342

CVE.ORG link : CVE-2017-5342


JSON object : View

Products Affected

tcpdump

  • tcpdump
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer