PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-7937 Tcpdump CVE debrief

CVE-2016-7937 is a critical memory-corruption issue in tcpdump’s VAT parser. NVD describes it as a buffer overflow in print-udp.c:vat_print() affecting tcpdump versions through 4.8.1, with a CVSS 3.0 score of 9.8. The issue was publicly published on 2017-01-28 and later referenced by multiple vendor and distro advisories.

Vendor
Tcpdump
Product
CVE-2016-7937
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-01-28
Original CVE updated
2026-05-13
Advisory published
2017-01-28
Advisory updated
2026-05-13

Who should care

Administrators, security teams, and developers who deploy or embed tcpdump 4.8.1 or earlier should care most. Systems that process untrusted packet captures or traffic with tcpdump tooling are the primary concern, especially where tcpdump is used operationally or in automated analysis pipelines.

Technical summary

NVD records the weakness as CWE-119 and identifies a buffer overflow in the VAT parser code path (print-udp.c:vat_print()). The affected version range is tcpdump up to and including 4.8.1, with the issue corrected in 4.9.0 or later per the CVE description. NVD’s CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a high-severity flaw with no privileges or user interaction required.

Defensive priority

High. This is a remotely reachable, low-complexity memory corruption issue with critical CVSS severity and full confidentiality, integrity, and availability impact in the published vector.

Recommended defensive actions

  • Upgrade tcpdump to 4.9.0 or later, or to a vendor-supported fixed package version.
  • Inventory hosts, containers, and appliances that include tcpdump 4.8.1 or earlier.
  • Prioritize patching systems that regularly analyze untrusted captures or network data.
  • Use vendor advisories to confirm fixed package versions for your distribution (for example Debian, Red Hat, or Gentoo).
  • If immediate upgrade is not possible, restrict access to tcpdump usage and reduce exposure to untrusted packet inputs.

Evidence notes

All core claims are supported by the supplied NVD record and references. The CVE description states the flaw is a buffer overflow in print-udp.c:vat_print() in tcpdump before 4.9.0. NVD lists affected versions through 4.8.1, CWE-119, and a CVSS 3.0 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The supplied references show downstream vendor and distro advisories from Debian, Red Hat, and Gentoo.

Official resources

Published by the CVE record on 2017-01-28. The supplied NVD record was last modified on 2026-05-13.