PatchSiren cyber security CVE debrief
CVE-2016-7927 Tcpdump CVE debrief
CVE-2016-7927 is a critical memory-safety flaw in tcpdump’s IEEE 802.11 parsing path. According to NVD, the bug is a buffer overflow in print-802_11.c:ieee802_11_radio_print(), with a CVSS 3.0 score of 9.8 and attack conditions that require only network access, no privileges, and no user interaction. Systems running vulnerable tcpdump releases should be upgraded promptly to a fixed version.
- Vendor
- Tcpdump
- Product
- CVE-2016-7927
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-28
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-28
- Advisory updated
- 2026-05-13
Who should care
Administrators, security teams, and developers who use tcpdump to inspect live traffic or process untrusted packet captures, especially in environments where packet parsing is exposed to attacker-controlled input.
Technical summary
NVD lists this issue as CWE-119 (buffer overflow) in tcpdump’s IEEE 802.11 parser. The affected CPE range includes tcpdump versions up to 4.8.1, and the vulnerability description states that tcpdump before 4.9.0 is affected. The NVD CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable flaw with high impact.
Defensive priority
Urgent
Recommended defensive actions
- Upgrade tcpdump to version 4.9.0 or later, or to the vendor-fixed package version provided by your distribution.
- Inventory systems that run tcpdump directly or embed its packet-parsing code, and prioritize any that process untrusted captures or mirrored network traffic.
- Treat packet-capture files and live traffic as untrusted input in security reviews and operational monitoring.
- Confirm remediation against the vendor advisories referenced by NVD, including Debian, Red Hat, and Gentoo notices.
Evidence notes
Source evidence comes from the public NVD CVE record published on 2017-01-28 and modified on 2026-05-13. NVD describes the flaw as a buffer overflow in print-802_11.c:ieee802_11_radio_print(), maps it to CWE-119, and assigns CVSS 3.0 9.8 with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The supplied NVD record also lists tcpdump versions through 4.8.1 as vulnerable and references Debian, Red Hat, and Gentoo security advisories.
Official resources
-
CVE-2016-7927 CVE record
CVE.org
-
CVE-2016-7927 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
- Source reference
Public CVE record first published by NVD on 2017-01-28 and later modified on 2026-05-13. No KEV entry was supplied for this issue.