CVE-2017-5342
tcpdump: multiple overflow issues in protocol decoding
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
En tcpdump en versiones anteriores a 4.9.0, un error interno en múltiples analizadores de protocolo (Geneve, GRE, NSH, OTV, VXLAN y VXLAN GPE) podría provocar un desbordamiento de búfer en print-ether.c:ether_print().
Multiple out of bounds read and integer overflow vulnerabilities were found in tcpdump affecting the decoding of various protocols. An attacker could create a crafted pcap file or send specially crafted packets to the network segment where tcpdump is running in live capture mode (without -w) which could cause it to display incorrect data, crash or enter an infinite loop.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-01-11 CVE Reserved
- 2017-01-28 CVE Published
- 2024-07-10 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/95852 | Third Party Advisory | |
http://www.securitytracker.com/id/1037755 | Vdb Entry | |
https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2017/dsa-3775 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:1871 | 2023-11-07 | |
https://security.gentoo.org/glsa/201702-30 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2017-5342 | 2017-08-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1419066 | 2017-08-01 |