PatchSiren cyber security CVE debrief
CVE-2016-7975 Tcpdump CVE debrief
CVE-2016-7975 is a critical buffer overflow in tcpdump's TCP parser, specifically in print-tcp.c:tcp_print(). NVD rates the issue 9.8 (CVSS 3.0) with network attack vector, no privileges, no user interaction, and high impact to confidentiality, integrity, and availability. The official record lists tcpdump versions through 4.8.1 as vulnerable; remediation is to move to a fixed release such as 4.9.0 or later.
- Vendor
- Tcpdump
- Product
- CVE-2016-7975
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-28
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-28
- Advisory updated
- 2026-05-13
Who should care
Security teams, Linux/Unix administrators, SOC and incident response teams, and package maintainers who run tcpdump on systems that analyze untrusted packet captures or live network traffic.
Technical summary
The vulnerable code path is the TCP parser in print-tcp.c:tcp_print(). NVD classifies the weakness as CWE-119 (buffer overflow). The CVSS 3.0 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable parsing flaw that can be triggered without privileges or user interaction and can have high impact. NVD's vulnerable CPE scope covers tcpdump up to 4.8.1.
Defensive priority
High. Because this is a pre-authentication parsing flaw in a common packet analysis tool, systems that process untrusted traffic or capture files should be prioritized for patching and version verification.
Recommended defensive actions
- Inventory all tcpdump installations and identify affected versions.
- Upgrade tcpdump to 4.9.0 or later, or apply the vendor/distro package update referenced by your platform.
- Prioritize systems that inspect untrusted packet captures or live network traffic.
- Verify remediation with package/version checks after updating.
- If patching is delayed, reduce exposure by avoiding untrusted captures on affected binaries and isolating impacted systems until fixed.
Evidence notes
Primary evidence comes from the official CVE and NVD records, which identify the TCP parser buffer overflow in tcpdump, the print-tcp.c:tcp_print() location, the CWE-119 classification, the CVSS 3.0 9.8 score, and the vulnerable version range through 4.8.1. The source metadata also lists downstream advisories from Debian, Red Hat, Gentoo, SecurityFocus, SecurityTracker, and a Debian bug thread as corroborating references.
Official resources
-
CVE-2016-7975 CVE record
CVE.org
-
CVE-2016-7975 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
- Source reference
Published in the CVE/NVD record on 2017-01-28. NVD last modified the record on 2026-05-13. This debrief uses the CVE publication date for timing context.