tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
References
Configurations
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3971 - | |
References | () http://www.securityfocus.com/bid/99939 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039307 - | |
References | () https://access.redhat.com/errata/RHEA-2018:0705 - | |
References | () https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl - Exploit, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201709-23 - | |
References | () https://support.apple.com/HT208221 - |
Information
Published : 2017-07-23 03:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11543
Mitre link : CVE-2017-11543
CVE.ORG link : CVE-2017-11543
JSON object : View
Products Affected
tcpdump
- tcpdump
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer