CVE-2017-11108Out-of-bounds Read in Tcpdump

Severity
7.5HIGHNVD
EPSS
1.9%
top 16.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 8
Latest updateMay 13

Description

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

debiandebian/tcpdump< tcpdump 4.9.1-1 (bookworm)
Debiantcpdump/tcpdump< 4.9.1-1+3
Ubuntutcpdump/tcpdump< 4.9.2-0ubuntu0.14.04.1+1
NVDtcpdump/tcpdump4.9.0

🔴Vulnerability Details

3
GHSA
GHSA-rr85-pcqj-p9q5: tcpdump 42022-05-13
OSV
tcpdump vulnerabilities2017-09-14
OSV
CVE-2017-11108: tcpdump 42017-07-08

📋Vendor Advisories

5
Apple
CVE-2017-11108: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan2017-10-31
Ubuntu
tcpdump vulnerabilities2017-09-14
Ubuntu
tcpdump vulnerabilities2017-09-14
Red Hat
tcpdump: Heap buffer overflow in the EXTRACT_16BITS function2017-07-07
Debian
CVE-2017-11108: tcpdump - tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based b...2017

💬Community

2
Bugzilla
CVE-2017-11108 tcpdump: Heap buffer overflow in the EXTRACT_16BITS function [fedora-all]2017-07-19
Bugzilla
CVE-2017-11108 tcpdump: Heap buffer overflow in the EXTRACT_16BITS function2017-07-19
CVE-2017-11108 — Out-of-bounds Read in Debian Tcpdump | cvebase