tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1090-1 tcpdump security update
Debian DSA Debian DSA DSA-3971-1 tcpdump security update
EUVD EUVD EUVD-2017-2745 tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
Ubuntu USN Ubuntu USN USN-3415-1 tcpdump vulnerabilities
Ubuntu USN Ubuntu USN USN-3415-2 tcpdump vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:57:57.636Z

Reserved: 2017-07-08T00:00:00

Link: CVE-2017-11108

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-07-08T17:29:00.197

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-11108

cve-icon Redhat

Severity : Low

Publid Date: 2017-07-07T00:00:00Z

Links: CVE-2017-11108 - Bugzilla

cve-icon OpenCVE Enrichment

No data.