CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.0%
Severity: Critical
Date : 2017-09-13
CVE-ID : CVE-2017-11541 CVE-2017-11542 CVE-2017-11543 CVE-2017-12893
CVE-2017-12894 CVE-2017-12895 CVE-2017-12896 CVE-2017-12897
CVE-2017-12898 CVE-2017-12899 CVE-2017-12900 CVE-2017-12901
CVE-2017-12902 CVE-2017-12985 CVE-2017-12986 CVE-2017-12987
CVE-2017-12988 CVE-2017-12989 CVE-2017-12990 CVE-2017-12991
CVE-2017-12992 CVE-2017-12993 CVE-2017-12994 CVE-2017-12995
CVE-2017-12996 CVE-2017-12997 CVE-2017-12998 CVE-2017-12999
CVE-2017-13000 CVE-2017-13001 CVE-2017-13002 CVE-2017-13003
CVE-2017-13004 CVE-2017-13005 CVE-2017-13006 CVE-2017-13007
CVE-2017-13008 CVE-2017-13009 CVE-2017-13010 CVE-2017-13011
CVE-2017-13012 CVE-2017-13013 CVE-2017-13014 CVE-2017-13015
CVE-2017-13016 CVE-2017-13017 CVE-2017-13018 CVE-2017-13019
CVE-2017-13020 CVE-2017-13021 CVE-2017-13022 CVE-2017-13023
CVE-2017-13024 CVE-2017-13025 CVE-2017-13026 CVE-2017-13027
CVE-2017-13028 CVE-2017-13029 CVE-2017-13030 CVE-2017-13031
CVE-2017-13032 CVE-2017-13033 CVE-2017-13034 CVE-2017-13035
CVE-2017-13036 CVE-2017-13037 CVE-2017-13038 CVE-2017-13039
CVE-2017-13040 CVE-2017-13041 CVE-2017-13042 CVE-2017-13043
CVE-2017-13044 CVE-2017-13045 CVE-2017-13046 CVE-2017-13047
CVE-2017-13048 CVE-2017-13049 CVE-2017-13050 CVE-2017-13051
CVE-2017-13052 CVE-2017-13053 CVE-2017-13054 CVE-2017-13055
CVE-2017-13687 CVE-2017-13688 CVE-2017-13689 CVE-2017-13690
CVE-2017-13725
Package : tcpdump
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-361
The package tcpdump before version 4.9.2-1 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Upgrade to 4.9.2-1.
The problems have been fixed upstream in version 4.9.2.
None.
A heap-based out-of-bounds read vulnerability was discovered in tcpdump
<= 4.9.1, in the lldp_print function in print-lldp.c, related to util-
print.c. An attacker could craft a malicious pcap file or send
specially crafted packets to the network that would cause tcpdump to
crash when attempting to print a summary of the packet data.
A heap-based out-of-bounds read vulnerability was discovered in tcpdump
<= 4.9.1, in the pimv1_print function in print-pim.c. An attacker could
craft a malicious pcap file or send specially crafted packets to the
network that would cause tcpdump to crash when attempting to print a
summary of the packet data.
An out-of-bounds write vulnerability was discovered in tcpdump’s
handling of LINKTYPE_SLIP in the sliplink_print function in print-sl.c.
An attacker could craft a malicious pcap file or send specially crafted
packets to the network that would cause tcpdump to crash or possibly
execute arbitrary code when attempting to print a summary of the packet
data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of SMB/CIFS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s parsers
when calling lookup_bytestring in tcpdump <= 4.9.1. An attacker could
craft a malicious pcap file or send specially crafted packets to the
network that would cause tcpdump to crash while processing the packet
data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ICMP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISAKMP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO CLNS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of NFS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of DECnet in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s parsers
when calling tok2strbuf in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of EIGRP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of Zephyr in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 routing headers in tcpdump <= 4.9.1. An attacker could
craft a malicious pcap file or send specially crafted packets to the
network that would cause tcpdump to crash while processing the packet
data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IEEE 802.11 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of telnet in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An infinite loop vulnerability was discovered in tcpdump’s handling of
RESP in tcpdump <= 4.9.1. An attacker could craft a malicious pcap file
or send specially crafted packets to the network that would cause
tcpdump to enter an infinite loop while processing the packet data
leading to denial of service.
An infinite loop vulnerability was discovered in tcpdump’s handling of
ISAKMP in tcpdump <= 4.9.1. An attacker could craft a malicious pcap
file or send specially crafted packets to the network that would cause
tcpdump to enter an infinite loop while processing the packet data
leading to denial of service.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BGP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of RIPng in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of Juniper in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BGP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An infinite loop vulnerability was discovered in tcpdump’s handling of
DNS in tcpdump <= 4.9.1. An attacker could craft a malicious pcap file
or send specially crafted packets to the network that would cause
tcpdump to enter an infinite loop while processing the packet data
leading to denial of service.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PIMv2 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An infinite loop vulnerability was discovered in tcpdump’s handling of
LLDP in tcpdump <= 4.9.1. An attacker could craft a malicious pcap file
or send specially crafted packets to the network that would cause
tcpdump to enter an infinite loop while processing the packet data
leading to denial of service.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO IS-IS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO IS-IS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IEEE 802.15.4 in tcpdump <= 4.9.1. An attacker could craft
a malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of NFS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of AODV in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of LMP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of Juniper in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of NFS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of L2TP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of Apple PKTAP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IEEE 802.11 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 mobility in tcpdump <= 4.9.1. An attacker could craft
a malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BEEP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds write vulnerability was discovered in tcpdump’s
parsers when calling bittok2str_internal. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash or possibly execute arbitrary code
while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ICMP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ARP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of White Board in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of EAP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO ES-IS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of DHCPv6 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PGM in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PGM in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of VTP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ICMPv6 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IP in tcpdump <= 4.9.1. An attacker could craft a malicious
pcap file or send specially crafted packets to the network that would
cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 mobility in tcpdump <= 4.9.1. An attacker could craft
a malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 mobility in tcpdump <= 4.9.1. An attacker could craft
a malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 mobility in tcpdump <= 4.9.1. An attacker could craft
a malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO IS-IS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of LLDP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BOOTP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PPP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PIM in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 fragmentation header in tcpdump <= 4.9.1. An attacker
could craft a malicious pcap file or send specially crafted packets to
the network that would cause tcpdump to crash while processing the
packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of RADIUS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of VTP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PGM in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO IS-IS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of OSPFv3 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IP in tcpdump <= 4.9.1. An attacker could craft a malicious
pcap file or send specially crafted packets to the network that would
cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of PPP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISAKMP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of MPTCP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ICMPv6 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of HNCP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BGP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of HNCP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of VQP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BGP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO ES-IP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of RSVP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of Rx in tcpdump <= 4.9.1. An attacker could craft a malicious
pcap file or send specially crafted packets to the network that would
cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of RPKI-Router in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of RSVP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of CFM in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of BGP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of LLDP in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of ISO IS-IS in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of Cisco HDLC in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of OLSR in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IKEv1 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IKEv2 in tcpdump <= 4.9.1. An attacker could craft a
malicious pcap file or send specially crafted packets to the network
that would cause tcpdump to crash while processing the packet data.
An out-of-bounds read vulnerability was discovered in tcpdump’s
handling of IPv6 routing headers in tcpdump <= 4.9.1. An attacker could
craft a malicious pcap file or send specially crafted packets to the
network that would cause tcpdump to crash while processing the packet
data.
A remote attacker is able to crash the application or execute arbitrary
code by tricking the user to open a specially crafted pcap file or by
sending specially crafted packets to the network.
http://www.tcpdump.org/tcpdump-changes.txt
https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print
https://github.com/the-tcpdump-group/tcpdump/commit/21d702a136c5c16882e368af7c173df728242280
https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim
https://github.com/the-tcpdump-group/tcpdump/commit/bed48062a64fca524156d7684af19f5b4a116fae
https://github.com/the-tcpdump-group/tcpdump/commit/7039327875525278d17edee59720e29a3e76b7b3
https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl
https://github.com/the-tcpdump-group/tcpdump/commit/6f5ba2b651cd9d4b7fa8ee5c4f94460645877c45
https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51
https://github.com/the-tcpdump-group/tcpdump/commit/2b62d1dda41590db29368ec7ba5f4faf3464765a
https://github.com/the-tcpdump-group/tcpdump/commit/4e430c6b0d8b7e77c7abca7e7afb0c3e727502f2
https://github.com/the-tcpdump-group/tcpdump/commit/f76e7feb41a4327d2b0978449bbdafe98d4a3771
https://github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de
https://github.com/the-tcpdump-group/tcpdump/commit/19d25dd8781620cd41bf178a5e2e27fc1cf242d0
https://github.com/the-tcpdump-group/tcpdump/commit/f96003b21e2abfbba59b926b10a7f9bc7d11e36c
https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751
https://github.com/the-tcpdump-group/tcpdump/commit/0318fa8b61bd6c837641129d585f1a73c652b1e0
https://github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4
https://github.com/the-tcpdump-group/tcpdump/commit/6ec0c6fa63412c7a07a5bcb790a529c3563b4173
https://github.com/the-tcpdump-group/tcpdump/commit/d17507ffa3e9742199b02a66aa940e79ababfa30
https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f
https://github.com/the-tcpdump-group/tcpdump/commit/7ac73d6cd41e9d4ac0ca7e6830ca390e195bb21c
https://github.com/the-tcpdump-group/tcpdump/commit/2ecb9d2c67d9119250c54811a6ce4d0f2ddf44f1
https://github.com/the-tcpdump-group/tcpdump/commit/99798bd9a41bd3d03fdc1e949810a38967f20ed3
https://github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3
https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4
https://github.com/the-tcpdump-group/tcpdump/commit/c2ef693866beae071a24b45c49f9674af1df4028
https://github.com/the-tcpdump-group/tcpdump/commit/50a44b6b8e4f7c127440dbd4239cf571945cc1e7
https://github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2
https://github.com/the-tcpdump-group/tcpdump/commit/b534e304568585707c4a92422aeca25cf908ff02
https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf
https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29
https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30
https://github.com/the-tcpdump-group/tcpdump/commit/34cec721d39c76be1e0a600829a7b17bdfb832b6
https://github.com/the-tcpdump-group/tcpdump/commit/979dcefd7b259e9e233f77fe1c5312793bfd948f
https://github.com/the-tcpdump-group/tcpdump/commit/3b32029db354cbc875127869d9b12a9addc75b50
https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f
https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184
https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97
https://github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123
https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38
https://github.com/the-tcpdump-group/tcpdump/commit/a25211918f2e790c67d859d20ccf8dbb81da1598
https://github.com/the-tcpdump-group/tcpdump/commit/35d146b7a66496d72cdeb95ccb33ab80a265ce90
https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc
https://github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd
https://github.com/the-tcpdump-group/tcpdump/commit/cc4a7391c616be7a64ed65742ef9ed3f106eb165
https://github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856
https://github.com/the-tcpdump-group/tcpdump/commit/5edf405d7ed9fc92f4f43e8a3d44baa4c6387562
https://github.com/the-tcpdump-group/tcpdump/commit/db8c799f6dfc68765c9451fcbfca06e662f5bd5f
https://github.com/the-tcpdump-group/tcpdump/commit/877b66b398518d9501513e0860c9f3a8acc70892
https://github.com/the-tcpdump-group/tcpdump/commit/9f0730bee3eb65d07b49fd468bc2f269173352fe
https://github.com/the-tcpdump-group/tcpdump/commit/8509ef02eceb2bbb479cea10fe4a7ec6395f1a8b
https://github.com/the-tcpdump-group/tcpdump/commit/13ab8d18617d616c7d343530f8a842e7143fb5cc
https://github.com/the-tcpdump-group/tcpdump/commit/cc356512f512e7fa423b3674db4bb31dbe40ffec
https://github.com/the-tcpdump-group/tcpdump/commit/985122081165753c7442bd7824c473eb9ff56308
https://github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8
https://github.com/the-tcpdump-group/tcpdump/commit/11b426ee05eb62ed103218526f1fa616851c43ce
https://github.com/the-tcpdump-group/tcpdump/commit/26a6799b9ca80508c05cac7a9a3bef922991520b
https://github.com/the-tcpdump-group/tcpdump/commit/4601c685e7fd19c3724d5e499c69b8d3ec49933e
https://github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863
https://github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75
https://github.com/the-tcpdump-group/tcpdump/commit/67c7126062d59729cd421bb38f9594015c9907ba
https://github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c
https://github.com/the-tcpdump-group/tcpdump/commit/b8e559afaeb8fe0604a1f8e3ad4dc1445de07a00
https://github.com/the-tcpdump-group/tcpdump/commit/2e1f6d9320afa83abc1ff716c7981fa504edadf2
https://github.com/the-tcpdump-group/tcpdump/commit/7d3aba9f06899d0128ef46e8a2fa143c6fad8f62
https://github.com/the-tcpdump-group/tcpdump/commit/5338aac7b8b880b0c5e0c15e27dadc44c5559284
https://github.com/the-tcpdump-group/tcpdump/commit/b20e1639dbac84b3fcb393858521c13ad47a9d70
https://github.com/the-tcpdump-group/tcpdump/commit/a77ff09c46560bc895dea11dc9fe643486b056ac
https://github.com/the-tcpdump-group/tcpdump/commit/66e22961b30547e9a8daa1f0e8dc9fbe6e2698fa
https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52
https://github.com/the-tcpdump-group/tcpdump/commit/7029d15f148ef24bb7c6668bc640f5470d085e5a
https://github.com/the-tcpdump-group/tcpdump/commit/5dc1860d8267b1e0cb78c9ffa2a40bea2fdb3ddc
https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125
https://github.com/the-tcpdump-group/tcpdump/commit/1bc78d795cd5cad5525498658f414a11ea0a7e9c
https://github.com/the-tcpdump-group/tcpdump/commit/ae83295915d08a854de27a88efac5dd7353e6d3f
https://github.com/the-tcpdump-group/tcpdump/commit/da6f1a677bfa4476abaeaf9b1afe1c4390f51b41
https://github.com/the-tcpdump-group/tcpdump/commit/571a6f33f47e7a2394fa08f925e534135c29cf1e
https://github.com/the-tcpdump-group/tcpdump/commit/88b2dac837e81cf56dce05e6e7b5989332c0092d
https://github.com/the-tcpdump-group/tcpdump/commit/2c2cfbd2b771ac888bc5c4a6d922f749d3822538
https://github.com/the-tcpdump-group/tcpdump/commit/7335163a6ef82d46ff18f3e6099a157747241629
https://github.com/the-tcpdump-group/tcpdump/commit/e0a5a02b0fc1900a69d6c37ed0aab36fb8494e6d
https://github.com/the-tcpdump-group/tcpdump/commit/4c3aee4bb0294c232d56b6d34e9eeb74f630fe8c
https://github.com/the-tcpdump-group/tcpdump/commit/f4b9e24c7384d882a7f434cc7413925bf871d63e
https://github.com/the-tcpdump-group/tcpdump/commit/39582c04cc5e34054b2936b423072fb9df2ff6ef
https://github.com/the-tcpdump-group/tcpdump/commit/d515b4b4a300479cdf1a6e0d1bb95bc1f9fee514
https://github.com/the-tcpdump-group/tcpdump/commit/c2f6833dddecf2d5fb89c9c898eee9981da342ed
https://github.com/the-tcpdump-group/tcpdump/commit/3b36ec4e713dea9266db11975066c425aa669b6c
https://github.com/the-tcpdump-group/tcpdump/commit/d10a0f980fe8f9407ab1ffbd612641433ebe175e
https://github.com/the-tcpdump-group/tcpdump/commit/331530a4076c69bbd2e3214db6ccbe834fb75640
https://github.com/the-tcpdump-group/tcpdump/commit/3c8a2b0e91d8d8947e89384dacf6b54673083e71
https://github.com/the-tcpdump-group/tcpdump/commit/aa0858100096a3490edf93034a80e66a4d61aad5
https://github.com/the-tcpdump-group/tcpdump/commit/83c64fce3a5226b080e535f5131a8a318f30e79b
https://github.com/the-tcpdump-group/tcpdump/commit/289c672020280529fd382f3502efab7100d638ec
https://github.com/the-tcpdump-group/tcpdump/commit/5d340a5ca6e420a70297cdbdf777333f18bfdab7
https://github.com/the-tcpdump-group/tcpdump/commit/bd4e697ebd6c8457efa8f28f6831fc929b88a014
https://github.com/the-tcpdump-group/tcpdump/commit/e6511cc1a950fe1566b2236329d6b4bd0826cc7a
https://github.com/the-tcpdump-group/tcpdump/commit/5d0d76e88ee2d3236d7e032589d6f1d4ec5f7b1e
https://github.com/the-tcpdump-group/tcpdump/commit/866c60236c41cea1e1654c8a071897292f64be49
https://github.com/the-tcpdump-group/tcpdump/commit/a1eefe986065846b6c69dbc09afd9fa1a02c4a3d
https://github.com/the-tcpdump-group/tcpdump/commit/0cb1b8a434b599b8d636db029aadb757c24e39d6
https://github.com/the-tcpdump-group/tcpdump/commit/061e7371a944588f231cb1b66d6fb070b646e376
https://github.com/the-tcpdump-group/tcpdump/commit/8dca25d26c7ca2caf6138267f6f17111212c156e
https://github.com/the-tcpdump-group/tcpdump/commit/c7c515ee03c285cc51376328de4ae9d549e501a5
https://github.com/the-tcpdump-group/tcpdump/commit/3c4d7c0ee30a30e5abff3d6d9586a3753101faf5
https://security.archlinux.org/CVE-2017-11541
https://security.archlinux.org/CVE-2017-11542
https://security.archlinux.org/CVE-2017-11543
https://security.archlinux.org/CVE-2017-12893
https://security.archlinux.org/CVE-2017-12894
https://security.archlinux.org/CVE-2017-12895
https://security.archlinux.org/CVE-2017-12896
https://security.archlinux.org/CVE-2017-12897
https://security.archlinux.org/CVE-2017-12898
https://security.archlinux.org/CVE-2017-12899
https://security.archlinux.org/CVE-2017-12900
https://security.archlinux.org/CVE-2017-12901
https://security.archlinux.org/CVE-2017-12902
https://security.archlinux.org/CVE-2017-12985
https://security.archlinux.org/CVE-2017-12986
https://security.archlinux.org/CVE-2017-12987
https://security.archlinux.org/CVE-2017-12988
https://security.archlinux.org/CVE-2017-12989
https://security.archlinux.org/CVE-2017-12990
https://security.archlinux.org/CVE-2017-12991
https://security.archlinux.org/CVE-2017-12992
https://security.archlinux.org/CVE-2017-12993
https://security.archlinux.org/CVE-2017-12994
https://security.archlinux.org/CVE-2017-12995
https://security.archlinux.org/CVE-2017-12996
https://security.archlinux.org/CVE-2017-12997
https://security.archlinux.org/CVE-2017-12998
https://security.archlinux.org/CVE-2017-12999
https://security.archlinux.org/CVE-2017-13000
https://security.archlinux.org/CVE-2017-13001
https://security.archlinux.org/CVE-2017-13002
https://security.archlinux.org/CVE-2017-13003
https://security.archlinux.org/CVE-2017-13004
https://security.archlinux.org/CVE-2017-13005
https://security.archlinux.org/CVE-2017-13006
https://security.archlinux.org/CVE-2017-13007
https://security.archlinux.org/CVE-2017-13008
https://security.archlinux.org/CVE-2017-13009
https://security.archlinux.org/CVE-2017-13010
https://security.archlinux.org/CVE-2017-13011
https://security.archlinux.org/CVE-2017-13012
https://security.archlinux.org/CVE-2017-13013
https://security.archlinux.org/CVE-2017-13014
https://security.archlinux.org/CVE-2017-13015
https://security.archlinux.org/CVE-2017-13016
https://security.archlinux.org/CVE-2017-13017
https://security.archlinux.org/CVE-2017-13018
https://security.archlinux.org/CVE-2017-13019
https://security.archlinux.org/CVE-2017-13020
https://security.archlinux.org/CVE-2017-13021
https://security.archlinux.org/CVE-2017-13022
https://security.archlinux.org/CVE-2017-13023
https://security.archlinux.org/CVE-2017-13024
https://security.archlinux.org/CVE-2017-13025
https://security.archlinux.org/CVE-2017-13026
https://security.archlinux.org/CVE-2017-13027
https://security.archlinux.org/CVE-2017-13028
https://security.archlinux.org/CVE-2017-13029
https://security.archlinux.org/CVE-2017-13030
https://security.archlinux.org/CVE-2017-13031
https://security.archlinux.org/CVE-2017-13032
https://security.archlinux.org/CVE-2017-13033
https://security.archlinux.org/CVE-2017-13034
https://security.archlinux.org/CVE-2017-13035
https://security.archlinux.org/CVE-2017-13036
https://security.archlinux.org/CVE-2017-13037
https://security.archlinux.org/CVE-2017-13038
https://security.archlinux.org/CVE-2017-13039
https://security.archlinux.org/CVE-2017-13040
https://security.archlinux.org/CVE-2017-13041
https://security.archlinux.org/CVE-2017-13042
https://security.archlinux.org/CVE-2017-13043
https://security.archlinux.org/CVE-2017-13044
https://security.archlinux.org/CVE-2017-13045
https://security.archlinux.org/CVE-2017-13046
https://security.archlinux.org/CVE-2017-13047
https://security.archlinux.org/CVE-2017-13048
https://security.archlinux.org/CVE-2017-13049
https://security.archlinux.org/CVE-2017-13050
https://security.archlinux.org/CVE-2017-13051
https://security.archlinux.org/CVE-2017-13052
https://security.archlinux.org/CVE-2017-13053
https://security.archlinux.org/CVE-2017-13054
https://security.archlinux.org/CVE-2017-13055
https://security.archlinux.org/CVE-2017-13687
https://security.archlinux.org/CVE-2017-13688
https://security.archlinux.org/CVE-2017-13689
https://security.archlinux.org/CVE-2017-13690
https://security.archlinux.org/CVE-2017-13725
www.tcpdump.org/tcpdump-changes.txt
github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl
github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim
github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print
github.com/the-tcpdump-group/tcpdump/commit/0318fa8b61bd6c837641129d585f1a73c652b1e0
github.com/the-tcpdump-group/tcpdump/commit/061e7371a944588f231cb1b66d6fb070b646e376
github.com/the-tcpdump-group/tcpdump/commit/0cb1b8a434b599b8d636db029aadb757c24e39d6
github.com/the-tcpdump-group/tcpdump/commit/11b426ee05eb62ed103218526f1fa616851c43ce
github.com/the-tcpdump-group/tcpdump/commit/13ab8d18617d616c7d343530f8a842e7143fb5cc
github.com/the-tcpdump-group/tcpdump/commit/19d25dd8781620cd41bf178a5e2e27fc1cf242d0
github.com/the-tcpdump-group/tcpdump/commit/1bc78d795cd5cad5525498658f414a11ea0a7e9c
github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de
github.com/the-tcpdump-group/tcpdump/commit/21d702a136c5c16882e368af7c173df728242280
github.com/the-tcpdump-group/tcpdump/commit/26a6799b9ca80508c05cac7a9a3bef922991520b
github.com/the-tcpdump-group/tcpdump/commit/289c672020280529fd382f3502efab7100d638ec
github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52
github.com/the-tcpdump-group/tcpdump/commit/2b62d1dda41590db29368ec7ba5f4faf3464765a
github.com/the-tcpdump-group/tcpdump/commit/2c2cfbd2b771ac888bc5c4a6d922f749d3822538
github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125
github.com/the-tcpdump-group/tcpdump/commit/2e1f6d9320afa83abc1ff716c7981fa504edadf2
github.com/the-tcpdump-group/tcpdump/commit/2ecb9d2c67d9119250c54811a6ce4d0f2ddf44f1
github.com/the-tcpdump-group/tcpdump/commit/331530a4076c69bbd2e3214db6ccbe834fb75640
github.com/the-tcpdump-group/tcpdump/commit/34cec721d39c76be1e0a600829a7b17bdfb832b6
github.com/the-tcpdump-group/tcpdump/commit/35d146b7a66496d72cdeb95ccb33ab80a265ce90
github.com/the-tcpdump-group/tcpdump/commit/39582c04cc5e34054b2936b423072fb9df2ff6ef
github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29
github.com/the-tcpdump-group/tcpdump/commit/3b32029db354cbc875127869d9b12a9addc75b50
github.com/the-tcpdump-group/tcpdump/commit/3b36ec4e713dea9266db11975066c425aa669b6c
github.com/the-tcpdump-group/tcpdump/commit/3c4d7c0ee30a30e5abff3d6d9586a3753101faf5
github.com/the-tcpdump-group/tcpdump/commit/3c8a2b0e91d8d8947e89384dacf6b54673083e71
github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc
github.com/the-tcpdump-group/tcpdump/commit/4601c685e7fd19c3724d5e499c69b8d3ec49933e
github.com/the-tcpdump-group/tcpdump/commit/4c3aee4bb0294c232d56b6d34e9eeb74f630fe8c
github.com/the-tcpdump-group/tcpdump/commit/4e430c6b0d8b7e77c7abca7e7afb0c3e727502f2
github.com/the-tcpdump-group/tcpdump/commit/50a44b6b8e4f7c127440dbd4239cf571945cc1e7
github.com/the-tcpdump-group/tcpdump/commit/5338aac7b8b880b0c5e0c15e27dadc44c5559284
github.com/the-tcpdump-group/tcpdump/commit/571a6f33f47e7a2394fa08f925e534135c29cf1e
github.com/the-tcpdump-group/tcpdump/commit/5d0d76e88ee2d3236d7e032589d6f1d4ec5f7b1e
github.com/the-tcpdump-group/tcpdump/commit/5d340a5ca6e420a70297cdbdf777333f18bfdab7
github.com/the-tcpdump-group/tcpdump/commit/5dc1860d8267b1e0cb78c9ffa2a40bea2fdb3ddc
github.com/the-tcpdump-group/tcpdump/commit/5edf405d7ed9fc92f4f43e8a3d44baa4c6387562
github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f
github.com/the-tcpdump-group/tcpdump/commit/66e22961b30547e9a8daa1f0e8dc9fbe6e2698fa
github.com/the-tcpdump-group/tcpdump/commit/67c7126062d59729cd421bb38f9594015c9907ba
github.com/the-tcpdump-group/tcpdump/commit/6ec0c6fa63412c7a07a5bcb790a529c3563b4173
github.com/the-tcpdump-group/tcpdump/commit/6f5ba2b651cd9d4b7fa8ee5c4f94460645877c45
github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30
github.com/the-tcpdump-group/tcpdump/commit/7029d15f148ef24bb7c6668bc640f5470d085e5a
github.com/the-tcpdump-group/tcpdump/commit/7039327875525278d17edee59720e29a3e76b7b3
github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51
github.com/the-tcpdump-group/tcpdump/commit/7335163a6ef82d46ff18f3e6099a157747241629
github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123
github.com/the-tcpdump-group/tcpdump/commit/7ac73d6cd41e9d4ac0ca7e6830ca390e195bb21c
github.com/the-tcpdump-group/tcpdump/commit/7d3aba9f06899d0128ef46e8a2fa143c6fad8f62
github.com/the-tcpdump-group/tcpdump/commit/83c64fce3a5226b080e535f5131a8a318f30e79b
github.com/the-tcpdump-group/tcpdump/commit/8509ef02eceb2bbb479cea10fe4a7ec6395f1a8b
github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f
github.com/the-tcpdump-group/tcpdump/commit/866c60236c41cea1e1654c8a071897292f64be49
github.com/the-tcpdump-group/tcpdump/commit/877b66b398518d9501513e0860c9f3a8acc70892
github.com/the-tcpdump-group/tcpdump/commit/88b2dac837e81cf56dce05e6e7b5989332c0092d
github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3
github.com/the-tcpdump-group/tcpdump/commit/8dca25d26c7ca2caf6138267f6f17111212c156e
github.com/the-tcpdump-group/tcpdump/commit/979dcefd7b259e9e233f77fe1c5312793bfd948f
github.com/the-tcpdump-group/tcpdump/commit/985122081165753c7442bd7824c473eb9ff56308
github.com/the-tcpdump-group/tcpdump/commit/99798bd9a41bd3d03fdc1e949810a38967f20ed3
github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97
github.com/the-tcpdump-group/tcpdump/commit/9f0730bee3eb65d07b49fd468bc2f269173352fe
github.com/the-tcpdump-group/tcpdump/commit/a1eefe986065846b6c69dbc09afd9fa1a02c4a3d
github.com/the-tcpdump-group/tcpdump/commit/a25211918f2e790c67d859d20ccf8dbb81da1598
github.com/the-tcpdump-group/tcpdump/commit/a77ff09c46560bc895dea11dc9fe643486b056ac
github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184
github.com/the-tcpdump-group/tcpdump/commit/aa0858100096a3490edf93034a80e66a4d61aad5
github.com/the-tcpdump-group/tcpdump/commit/ae83295915d08a854de27a88efac5dd7353e6d3f
github.com/the-tcpdump-group/tcpdump/commit/b20e1639dbac84b3fcb393858521c13ad47a9d70
github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd
github.com/the-tcpdump-group/tcpdump/commit/b534e304568585707c4a92422aeca25cf908ff02
github.com/the-tcpdump-group/tcpdump/commit/b8e559afaeb8fe0604a1f8e3ad4dc1445de07a00
github.com/the-tcpdump-group/tcpdump/commit/bd4e697ebd6c8457efa8f28f6831fc929b88a014
github.com/the-tcpdump-group/tcpdump/commit/bed48062a64fca524156d7684af19f5b4a116fae
github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8
github.com/the-tcpdump-group/tcpdump/commit/c2ef693866beae071a24b45c49f9674af1df4028
github.com/the-tcpdump-group/tcpdump/commit/c2f6833dddecf2d5fb89c9c898eee9981da342ed
github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75
github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751
github.com/the-tcpdump-group/tcpdump/commit/c7c515ee03c285cc51376328de4ae9d549e501a5
github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856
github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38
github.com/the-tcpdump-group/tcpdump/commit/cc356512f512e7fa423b3674db4bb31dbe40ffec
github.com/the-tcpdump-group/tcpdump/commit/cc4a7391c616be7a64ed65742ef9ed3f106eb165
github.com/the-tcpdump-group/tcpdump/commit/d10a0f980fe8f9407ab1ffbd612641433ebe175e
github.com/the-tcpdump-group/tcpdump/commit/d17507ffa3e9742199b02a66aa940e79ababfa30
github.com/the-tcpdump-group/tcpdump/commit/d515b4b4a300479cdf1a6e0d1bb95bc1f9fee514
github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863
github.com/the-tcpdump-group/tcpdump/commit/da6f1a677bfa4476abaeaf9b1afe1c4390f51b41
github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4
github.com/the-tcpdump-group/tcpdump/commit/db8c799f6dfc68765c9451fcbfca06e662f5bd5f
github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4
github.com/the-tcpdump-group/tcpdump/commit/e0a5a02b0fc1900a69d6c37ed0aab36fb8494e6d
github.com/the-tcpdump-group/tcpdump/commit/e6511cc1a950fe1566b2236329d6b4bd0826cc7a
github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2
github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c
github.com/the-tcpdump-group/tcpdump/commit/f4b9e24c7384d882a7f434cc7413925bf871d63e
github.com/the-tcpdump-group/tcpdump/commit/f76e7feb41a4327d2b0978449bbdafe98d4a3771
github.com/the-tcpdump-group/tcpdump/commit/f96003b21e2abfbba59b926b10a7f9bc7d11e36c
github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf
security.archlinux.org/AVG-361
security.archlinux.org/CVE-2017-11541
security.archlinux.org/CVE-2017-11542
security.archlinux.org/CVE-2017-11543
security.archlinux.org/CVE-2017-12893
security.archlinux.org/CVE-2017-12894
security.archlinux.org/CVE-2017-12895
security.archlinux.org/CVE-2017-12896
security.archlinux.org/CVE-2017-12897
security.archlinux.org/CVE-2017-12898
security.archlinux.org/CVE-2017-12899
security.archlinux.org/CVE-2017-12900
security.archlinux.org/CVE-2017-12901
security.archlinux.org/CVE-2017-12902
security.archlinux.org/CVE-2017-12985
security.archlinux.org/CVE-2017-12986
security.archlinux.org/CVE-2017-12987
security.archlinux.org/CVE-2017-12988
security.archlinux.org/CVE-2017-12989
security.archlinux.org/CVE-2017-12990
security.archlinux.org/CVE-2017-12991
security.archlinux.org/CVE-2017-12992
security.archlinux.org/CVE-2017-12993
security.archlinux.org/CVE-2017-12994
security.archlinux.org/CVE-2017-12995
security.archlinux.org/CVE-2017-12996
security.archlinux.org/CVE-2017-12997
security.archlinux.org/CVE-2017-12998
security.archlinux.org/CVE-2017-12999
security.archlinux.org/CVE-2017-13000
security.archlinux.org/CVE-2017-13001
security.archlinux.org/CVE-2017-13002
security.archlinux.org/CVE-2017-13003
security.archlinux.org/CVE-2017-13004
security.archlinux.org/CVE-2017-13005
security.archlinux.org/CVE-2017-13006
security.archlinux.org/CVE-2017-13007
security.archlinux.org/CVE-2017-13008
security.archlinux.org/CVE-2017-13009
security.archlinux.org/CVE-2017-13010
security.archlinux.org/CVE-2017-13011
security.archlinux.org/CVE-2017-13012
security.archlinux.org/CVE-2017-13013
security.archlinux.org/CVE-2017-13014
security.archlinux.org/CVE-2017-13015
security.archlinux.org/CVE-2017-13016
security.archlinux.org/CVE-2017-13017
security.archlinux.org/CVE-2017-13018
security.archlinux.org/CVE-2017-13019
security.archlinux.org/CVE-2017-13020
security.archlinux.org/CVE-2017-13021
security.archlinux.org/CVE-2017-13022
security.archlinux.org/CVE-2017-13023
security.archlinux.org/CVE-2017-13024
security.archlinux.org/CVE-2017-13025
security.archlinux.org/CVE-2017-13026
security.archlinux.org/CVE-2017-13027
security.archlinux.org/CVE-2017-13028
security.archlinux.org/CVE-2017-13029
security.archlinux.org/CVE-2017-13030
security.archlinux.org/CVE-2017-13031
security.archlinux.org/CVE-2017-13032
security.archlinux.org/CVE-2017-13033
security.archlinux.org/CVE-2017-13034
security.archlinux.org/CVE-2017-13035
security.archlinux.org/CVE-2017-13036
security.archlinux.org/CVE-2017-13037
security.archlinux.org/CVE-2017-13038
security.archlinux.org/CVE-2017-13039
security.archlinux.org/CVE-2017-13040
security.archlinux.org/CVE-2017-13041
security.archlinux.org/CVE-2017-13042
security.archlinux.org/CVE-2017-13043
security.archlinux.org/CVE-2017-13044
security.archlinux.org/CVE-2017-13045
security.archlinux.org/CVE-2017-13046
security.archlinux.org/CVE-2017-13047
security.archlinux.org/CVE-2017-13048
security.archlinux.org/CVE-2017-13049
security.archlinux.org/CVE-2017-13050
security.archlinux.org/CVE-2017-13051
security.archlinux.org/CVE-2017-13052
security.archlinux.org/CVE-2017-13053
security.archlinux.org/CVE-2017-13054
security.archlinux.org/CVE-2017-13055
security.archlinux.org/CVE-2017-13687
security.archlinux.org/CVE-2017-13688
security.archlinux.org/CVE-2017-13689
security.archlinux.org/CVE-2017-13690
security.archlinux.org/CVE-2017-13725
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
96.0%