PatchSiren cyber security CVE debrief
CVE-2017-5486 Tcpdump CVE debrief
CVE-2017-5486 is a critical buffer overflow in tcpdump’s ISO CLNS parser, specifically in print-isoclns.c:clnp_print(). NVD’s record marks affected tcpdump versions through 4.8.1 and assigns a CVSS 3.0 vector indicating network reachability, no privileges, no user interaction, and high confidentiality, integrity, and availability impact.
- Vendor
- Tcpdump
- Product
- CVE-2017-5486
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-28
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-28
- Advisory updated
- 2026-05-13
Who should care
Security teams running tcpdump on production hosts, packet capture appliances, analysis pipelines, and Linux distributions that package tcpdump 4.8.1 or earlier should prioritize this issue. It is especially relevant where tcpdump may process untrusted network traffic or packet captures.
Technical summary
The flaw is a buffer overflow in the ISO CLNS parsing path of tcpdump, with the vulnerable function identified as clnp_print() in print-isoclns.c. The CVE description places the issue in tcpdump before 4.9.0, while NVD’s CPE data marks tcpdump up to and including 4.8.1 as vulnerable and classifies the weakness as CWE-119.
Defensive priority
High. This is a critical memory-safety issue in a widely used packet analysis tool, with NVD assigning CVSS 9.8 and a network-based attack vector. Patch or replace affected builds promptly, especially on systems that analyze untrusted traffic or captures.
Recommended defensive actions
- Upgrade tcpdump to 4.9.0 or a vendor package that includes the fix.
- Inventory systems and images for tcpdump 4.8.1 and earlier, including embedded and offline analysis environments.
- Review distribution advisories and errata for package-specific remediation from Debian, Red Hat, and Gentoo.
- Limit tcpdump use on untrusted input until patched, and restrict who can run packet capture/analysis jobs.
- Validate that any backported security update in your distro actually includes the tcpdump fix rather than only a version string change.
Evidence notes
The CVE description states that the ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print(). NVD metadata supplies the affected CPE range (tcpdump through 4.8.1), CVSS 3.0 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), and CWE-119 classification. The supplied references include Debian, Red Hat, and Gentoo advisories/errata, indicating ecosystem remediation activity. No KEV entry was supplied for this CVE.
Official resources
-
CVE-2017-5486 CVE record
CVE.org
-
CVE-2017-5486 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
- Source reference
- Source reference
CVE published 2017-01-28T01:59:01.357Z; NVD modified 2026-05-13T00:24:29.033Z.