Risk | High |
Patch available | YES |
Number of vulnerabilities | 41 |
CVE-ID | CVE-2016-7922 CVE-2016-7923 CVE-2016-7924 CVE-2016-7925 CVE-2016-7926 CVE-2016-7927 CVE-2016-7928 CVE-2016-7930 CVE-2016-7931 CVE-2016-7932 CVE-2016-7933 CVE-2016-7934 CVE-2016-7935 CVE-2016-7936 CVE-2016-7937 CVE-2016-7939 CVE-2016-7940 CVE-2016-7973 CVE-2016-7974 CVE-2016-7975 CVE-2016-7983 CVE-2016-7984 CVE-2016-7992 CVE-2016-7993 CVE-2016-8574 CVE-2016-8575 CVE-2017-5202 CVE-2017-5203 CVE-2017-5204 CVE-2017-5482 CVE-2017-5483 CVE-2017-5484 CVE-2017-5486 CVE-2017-5485 CVE-2017-5342 CVE-2017-5341 CVE-2017-5205 CVE-2016-7986 CVE-2016-7985 CVE-2016-7938 CVE-2016-7929 |
CWE-ID | CWE-120 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Tcpdump Server applications / DLP, anti-spam, sniffers |
Vendor | Tcpdump.org |
Security Bulletin
This security bulletin contains information about 41 vulnerabilities.
EUVDB-ID: #VU6729
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7922
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-ah.c:ah_print() in the AH parser. A remote attacker can use a specially crafted AH protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6730
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7923
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-arp.c:arp_print() in the ARP parser. A remote attacker can use a specially crafted ARP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6731
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7924
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-atm.c:oam_print() in the compressed ATM parser. A remote attacker can use a specially crafted ATM protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6732
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7925
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-sl.c:sl_if_print() in the compressed SLIP parser. A remote attacker can use a specially crafted SLIP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6733
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7926
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-ether.c:ethertype_print() in the Ethernet parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6734
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7927
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-802_11.c:ieee802_11_radio_print() in the IEEE 802.11 parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6735
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7928
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-ipcomp.c:ipcomp_print() in the IPComp parser. A remote attacker can use a specially crafted IPComp protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6736
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7930
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-llc.c:llc_print() in the LLC/SNAP parser. A remote attacker can use a specially crafted LLC/SNAP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6737
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7931
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-mpls.c:mpls_print() in the MPLS parser. A remote attacker can use a specially crafted MPLS protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6738
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7932
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-pim.c:pimv2_check_checksum() in the PIM parser. A remote attacker can use a specially crafted PIM protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6739
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7933
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-ppp.c:ppp_hdlc_if_print() in the PPP parser. A remote attacker can use a specially crafted PPP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6740
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7934
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-udp.c:rtcp_print() in the RTCP parser. A remote attacker can use a specially crafted RTCP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6741
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7935
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-udp.c:rtp_print() in the RTP parser. A remote attacker can use a specially crafted RTP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6742
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7936
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-udp.c:udp_print() in the UDP parser. A remote attacker can use a specially crafted UDP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6743
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7937
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-udp.c:vat_print() in the VAT parser. A remote attacker can use a specially crafted VAT protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6744
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7939
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-gre.c in the GRE parser. A remote attacker can use a specially crafted GRE protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6745
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7940
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-stp.c in the STP parser. A remote attacker can use a specially crafted STP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6746
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7973
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-atalk.c in the AppleTalk parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6747
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7974
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-ip.c in the IP parser. A remote attacker can use a speciall crafted IP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6748
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7975
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-tcp.c:tcp_print() in the TCP parser. A remote attacker can use a speciall crafted TCP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6749
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7983
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-bootp.c:bootp_print() in the BOOTP parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6750
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7984
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-tftp.c:tftp_print() in the TFTP parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6751
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7992
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-cip.c:cip_if_print() in the Classical IP over ATM parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6752
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7993
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the util-print.c:relts_print() in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6753
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-8574
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-fr.c:frf15_print() in the FRF.15 parser. A remote attacker can use a specially crafted FRF.15 protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6754
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-8575
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-fr.c:q933_print() in the Q.933 parser. A remote attacker can use a specially crafted Q.933 protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6755
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5202
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-isoclns.c:clnp_print() in the ISO CLNS parser. A remote attacker can use a specially crafted ISO CLNS protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6756
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5203
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-bootp.c:bootp_print() in the BOOTP parser. A remote attacker can use a specially crafted BOOTP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6757
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5204
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-ip6.c:ip6_print() in the IPv6 parser. A remote attacker can use a specially crafted IPv6 protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6758
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5482
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-fr.c:q933_print() in the Q.933 parser. A remote attacker can use a specially crafted Q.933 protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6759
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5483
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-snmp.c:asn1_parse() in the SNMP parser. A remote attacker can use a specially crafted SNMP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6760
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5484
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-atm.c:sig_print() in the ATM parser. A remote attacker can use a specially crafted ATM protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6761
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5486
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-isoclns.c:clnp_print() in the ISO CLNS parser. A remote attacker can use a specially crafted ISO CLNS protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6805
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5485
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in addrtoname.c:lookup_nsap() in the ISO CLNS parser. A remote attacker can use a specially crafted ISO CLNS protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6806
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5342
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-ether.c:ether_print() in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE). A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6808
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5341
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-otv.c:otv_print() in the OTV parser. A remote attacker can use a specially crafted OTV protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6809
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-5205
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in print-isakmp.c:ikev2_e_print() in the ISAKMP parser. A remote attacker can use a specially crafted ISAKMP protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6810
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7986
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-geonet.c in the GeoNetworking parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6811
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7985
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-calm-fast.c:calm_fast_print() in the CALM FAST parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6812
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7938
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-zeromq.c:zmtp1_print_frame() in the ZeroMQ parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU6813
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7929
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target system.
The weakness exists due to buffer overflow in the print-juniper.c:juniper_parse_header() in the Juniper PPPoE ATM parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Update to version 4.9.0.
Tcpdump: 3.6.2 - 4.8.1
External linkshttp://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.