PatchSiren cyber security CVE debrief
CVE-2017-5342 Tcpdump CVE debrief
CVE-2017-5342 is a critical tcpdump memory-safety flaw in print-ether.c:ether_print() that the CVE description ties to multiple protocol parsers: Geneve, GRE, NSH, OTV, VXLAN, and VXLAN GPE. NVD rates it as remotely reachable with no privileges or user interaction and with high confidentiality, integrity, and availability impact. The affected range in NVD’s CPE data is tcpdump 4.8.1 and earlier, while the CVE description says the bug was fixed before 4.9.0.
- Vendor
- Tcpdump
- Product
- CVE-2017-5342
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-28
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-28
- Advisory updated
- 2026-05-13
Who should care
Administrators and defenders running tcpdump 4.8.1 or earlier, especially in environments that parse or inspect Geneve, GRE, NSH, OTV, VXLAN, or VXLAN GPE traffic. Package maintainers and incident response teams should also verify whether downstream vendor builds include the fix.
Technical summary
The issue is a buffer overflow in tcpdump’s ether_print() path, triggered through several protocol parsers in the Ethernet printing logic. Because NVD scores it AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, the record treats it as network-reachable, low-complexity, and requiring neither privileges nor user interaction. The root weakness is mapped to CWE-119.
Defensive priority
Urgent
Recommended defensive actions
- Upgrade tcpdump to 4.9.0 or later, or install the vendor backport that includes the fix.
- Check deployed systems for tcpdump versions at or below 4.8.1 and prioritize any systems that handle the listed tunnel encapsulations.
- Apply the relevant vendor advisories referenced in the record, including Debian DSA-3775, Red Hat RHSA-2017:1871, and Gentoo GLSA 201702-30.
- Use package management or asset inventory to confirm that all hosts analyzing packet captures are on a fixed build.
Evidence notes
Primary evidence comes from the CVE description and NVD metadata. The description explicitly names the affected function (print-ether.c:ether_print()) and parser families (Geneve, GRE, NSH, OTV, VXLAN, VXLAN GPE). NVD provides the vulnerable CPE range (tcpdump 4.8.1 and earlier), the CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and CWE-119. Additional references in the CVE metadata point to Debian, Red Hat, Gentoo, SecurityFocus, SecurityTracker, and a Debian bug mailing list thread.
Official resources
-
CVE-2017-5342 CVE record
CVE.org
-
CVE-2017-5342 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
- Source reference
CVE published at 2017-01-28T01:59:01.203Z; the NVD record was last modified at 2026-05-13T00:24:29.033Z. No KEV date was supplied in the provided corpus.