Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-11108

Опубликовано: 08 июл. 2017
Источник: debian

Описание

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tcpdumpfixed4.9.1-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1468504

  • Proposed patch: https://github.com/the-tcpdump-group/tcpdump/pull/617

  • https://github.com/the-tcpdump-group/tcpdump/commit/d9e65de3d94698ec90dbca42962a30dd2f0680e1 (4.9.1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

CVSS3: 3.3
redhat
больше 8 лет назад

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

CVSS3: 7.5
nvd
больше 8 лет назад

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

CVSS3: 7.5
github
больше 3 лет назад

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

suse-cvrf
больше 8 лет назад

Security update for tcpdump