CVE-2017-11108

Published: 08 July 2017

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
tcpdump
Launchpad, Ubuntu, Debian
Upstream
Released (4.9.1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (4.9.2-0ubuntu0.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (4.9.2-0ubuntu0.14.04.1)
Patches:
Upstream: https://github.com/the-tcpdump-group/tcpdump/commit/d9e65de3d94698ec90dbca42962a30dd2f0680e1