CVE-2016-7934
tcpdump: multiple overflow issues in protocol decoding
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
El analizador RTCP en tcpdump en versiones anteriores a 4.9.0 tiene un desbordamiento de bĂșfer en print-udp.c:rtcp_print().
Multiple out of bounds read and integer overflow vulnerabilities were found in tcpdump affecting the decoding of various protocols. An attacker could create a crafted pcap file or send specially crafted packets to the network segment where tcpdump is running in live capture mode (without -w) which could cause it to display incorrect data, crash or enter an infinite loop.
The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. The following packages have been upgraded to a later upstream version: tcpdump. Security Fix: Multiple out of bounds read and integer overflow vulnerabilities were found in tcpdump affecting the decoding of various protocols. An attacker could create a crafted pcap file or send specially crafted packets to the network segment where tcpdump is running in live capture mode which could cause it to display incorrect data, crash or enter an infinite loop.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-09-09 CVE Reserved
- 2017-01-28 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95852 | Third Party Advisory | |
http://www.securitytracker.com/id/1037755 | Vdb Entry | |
https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html | X_refsource_confirm |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2017/dsa-3775 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:1871 | 2023-11-07 | |
https://security.gentoo.org/glsa/201702-30 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2016-7934 | 2017-08-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1419066 | 2017-08-01 |