PatchSiren cyber security CVE debrief
CVE-2016-7985 Tcpdump CVE debrief
CVE-2016-7985 is a critical buffer overflow in tcpdump’s CALM FAST parser, specifically in print-calm-fast.c:calm_fast_print(). The CVE was published on 2017-01-28; NVD later updated the record on 2026-05-13, which reflects record maintenance rather than the original disclosure date. Source references include Debian, Red Hat, and Gentoo advisories for affected systems.
- Vendor
- Tcpdump
- Product
- CVE-2016-7985
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-28
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-28
- Advisory updated
- 2026-05-13
Who should care
Security teams, Linux distribution maintainers, and operators who rely on tcpdump for packet analysis should treat this as a high-priority patch item, especially where tcpdump may process untrusted capture data or network traffic.
Technical summary
The issue is a CWE-119 buffer overflow in tcpdump’s CALM FAST parser. The supplied corpus describes the vulnerable range as tcpdump versions before 4.9.0, while NVD’s CPE criteria list affected versions through 4.8.1. NVD rates the issue CVSS 3.0 9.8 with network attack vector, low complexity, no privileges, and no user interaction.
Defensive priority
Critical. Patch immediately and verify all packaged tcpdump instances are upgraded to a fixed release or distribution backport.
Recommended defensive actions
- Upgrade tcpdump to a fixed release; the supplied corpus indicates 4.9.0 or later.
- Check distribution advisories and apply vendor package updates from Debian, Red Hat, Gentoo, or your OS vendor.
- Inventory systems and workflows that invoke tcpdump or consume packet captures from untrusted sources.
- Limit exposure of tcpdump to untrusted input until patched, including automated parsing jobs and forensic pipelines.
- Validate that patched versions are deployed everywhere tcpdump is bundled, including appliances and embedded tooling.
- Track affected package versions carefully, since the source corpus shows a version-bound discrepancy between the narrative description and NVD CPE data.
Evidence notes
The description states a buffer overflow in print-calm-fast.c:calm_fast_print() affecting tcpdump before 4.9.0. NVD classifies the weakness as CWE-119 and lists CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. References in the corpus point to Debian DSA-3775, Red Hat RHSA-2017:1871, and Gentoo GLSA 201702-30.
Official resources
-
CVE-2016-7985 CVE record
CVE.org
-
CVE-2016-7985 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
- Source reference
CVE published 2017-01-28. The supplied NVD record was last modified 2026-05-13. No KEV entry was provided in the corpus, and no ransomware-campaign linkage was provided.