CVE-2017-5204Improper Restriction of Operations within the Bounds of a Memory Buffer in Tcpdump

Severity
9.8CRITICALNVD
EPSS
2.6%
top 14.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 28
Latest updateMay 14

Description

The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

Also affects: Debian Linux 8.0, 9.0, Enterprise Linux 7.4, 7.6, 7.5

🔴Vulnerability Details

3
GHSA
GHSA-57w3-589g-v9r8: The IPv6 parser in tcpdump before 42022-05-14
CVEList
CVE-2017-5204: The IPv6 parser in tcpdump before 42017-01-28
OSV
CVE-2017-5204: The IPv6 parser in tcpdump before 42017-01-28

📋Vendor Advisories

4
Apple
CVE-2017-5204: macOS Sierra 10.12.4, Security Update 2017-001 El Capitan, and Security Update 2017-001 Yosemite2017-03-27
Ubuntu
tcpdump vulnerabilities2017-02-21
Red Hat
tcpdump: multiple overflow issues in protocol decoding2017-02-02
Debian
CVE-2017-5204: tcpdump - The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6...2017

💬Community

3
HackerOne
CVE-2017-5204: The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print()2019-10-08
Bugzilla
tcpdump: multiple overflow issues in protocol decoding2017-02-03
Bugzilla
tcpdump: various flaws [fedora-all]2017-02-03
CVE-2017-5204 — Tcpdump vulnerability | cvebase