9.6 High
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.1%
Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().
www.debian.org/security/2017/dsa-3971
www.securitytracker.com/id/1039307
www.tcpdump.org/tcpdump-changes.txt
access.redhat.com/errata/RHEA-2018:0705
github.com/the-tcpdump-group/tcpdump/commit/9f0730bee3eb65d07b49fd468bc2f269173352fe
security.gentoo.org/glsa/201709-23
support.apple.com/HT208221