PatchSiren

Tcpdump CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2017-5486

CVE-2017-5486 is a critical buffer overflow in tcpdump’s ISO CLNS parser, specifically in print-isoclns.c:clnp_print(). NVD’s record marks affected tcpdump versions through 4.8.1 and assigns a CVSS 3.0 vector indicating network reachability, no privileges, no user interaction, and high confidentiality, integrity, and availability impact.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2017-5485

CVE-2017-5485 is a critical buffer overflow in tcpdump’s ISO CLNS parser, specifically addrtoname.c:lookup_nsap(). The official record rates it CVSS 9.8 and maps affected tcpdump releases through 4.8.1. Systems that use tcpdump to process untrusted network traffic or packet data should be updated to a fixed release as a high priority.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2017-5484

CVE-2017-5484 is a critical memory-safety flaw in tcpdump’s ATM parser. The issue is in print-atm.c:sig_print(), and NVD rates it 9.8 with CWE-119 impacts. Systems processing untrusted packet data should be updated promptly.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2017-5482

CVE-2017-5482 is a critical memory-corruption issue in tcpdump's Q.933 parser. The affected code path is print-fr.c:q933_print(), and the CVE description says this is a different vulnerability than CVE-2016-8575. NVD maps the issue to tcpdump versions up to 4.8.1, so any environment still running older builds should treat this as a high-priority update.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2017-5342

CVE-2017-5342 is a critical tcpdump memory-safety flaw in print-ether.c:ether_print() that the CVE description ties to multiple protocol parsers: Geneve, GRE, NSH, OTV, VXLAN, and VXLAN GPE. NVD rates it as remotely reachable with no privileges or user interaction and with high confidentiality, integrity, and availability impact. The affected range in NVD’s CPE data is tcpdump 4.8.1 and earlier, while the [truncated]

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2017-5341

CVE-2017-5341 is a critical memory-corruption flaw in tcpdump’s OTV parser. According to the NVD record, tcpdump versions before 4.9.0 are affected, and the issue is classified as CWE-119 with a CVSS 3.0 score of 9.8. Because tcpdump is commonly used to process network traffic and capture files, this should be treated as an immediate remediation item wherever older builds remain in use.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7993

CVE-2016-7993 is a critical tcpdump flaw in util-print.c:relts_print() that can lead to a buffer overflow while parsing multiple protocol families, including DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, and PIM. NVD lists affected tcpdump versions through 4.8.1 and assigns a CVSS 3.0 base score of 9.8 with no privileges or user interaction required. From a defensive standpoint, this is the kind [truncated]

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7992

CVE-2016-7992 is a critical memory-corruption flaw in tcpdump’s Classical IP over ATM parsing path. The vulnerable code is in print-cip.c:cip_if_print(), and the issue is rated 9.8 with confidentiality, integrity, and availability impact.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7986

CVE-2016-7986 is a critical buffer overflow in tcpdump’s GeoNetworking parser, affecting print-geonet.c and multiple functions. NVD assigns a CVSS 3.0 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating remote, low-complexity impact with no privileges or user interaction required. The CVE record and vendor advisories indicate affected tcpdump releases before 4.9.0, while NVD’s vulnerable CPE ra [truncated]

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7985

CVE-2016-7985 is a critical buffer overflow in tcpdump’s CALM FAST parser, specifically in print-calm-fast.c:calm_fast_print(). The CVE was published on 2017-01-28; NVD later updated the record on 2026-05-13, which reflects record maintenance rather than the original disclosure date. Source references include Debian, Red Hat, and Gentoo advisories for affected systems.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7984

CVE-2016-7984 is a critical memory-corruption issue in tcpdump’s TFTP parser. The flaw is described as a buffer overflow in print-tftp.c:tftp_print(), and NVD rates the issue 9.8/10 with network access, no privileges, no user interaction, and high impact to confidentiality, integrity, and availability. The supplied CVE description says tcpdump before 4.9.0 is affected; NVD’s CPE data marks vulnerable vers [truncated]

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7975

CVE-2016-7975 is a critical buffer overflow in tcpdump's TCP parser, specifically in print-tcp.c:tcp_print(). NVD rates the issue 9.8 (CVSS 3.0) with network attack vector, no privileges, no user interaction, and high impact to confidentiality, integrity, and availability. The official record lists tcpdump versions through 4.8.1 as vulnerable; remediation is to move to a fixed release such as 4.9.0 or later.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7974

CVE-2016-7974 is a critical memory-safety issue in tcpdump's IP parser. NVD describes a buffer overflow in print-ip.c affecting multiple functions, with vulnerable versions through 4.8.1 and a critical CVSS 9.8 rating. Systems that use tcpdump to inspect untrusted packet data should treat remediation as urgent.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7973

CVE-2016-7973 is a critical memory-corruption issue in tcpdump’s AppleTalk parser. The supplied record says the bug is in print-atalk.c across multiple functions, and NVD scores it 9.8 because it can be triggered without privileges or user interaction. Treat any affected tcpdump deployment as urgent to patch.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7940

CVE-2016-7940 is a critical memory-safety issue in tcpdump’s STP parser. According to NVD, tcpdump versions through 4.8.1 are affected, and the issue is described as a buffer overflow in print-stp.c affecting multiple functions. The CVSS vector is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high impact if malformed traffic or capture content is processed by a vulnerable build.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7939

CVE-2016-7939 is a critical buffer overflow in tcpdump’s GRE parser code path (print-gre.c), affecting tcpdump versions through 4.8.1. The NVD CVSS 3.0 vector rates it as network-reachable, low-complexity, no-authentication, no-user-interaction, with high confidentiality, integrity, and availability impact. The practical defensive takeaway is straightforward: systems that process untrusted packet captures [truncated]

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7938

CVE-2016-7938 is a critical tcpdump flaw in the ZeroMQ parser. The vulnerable code path, print-zeromq.c:zmtp1_print_frame(), can hit an integer overflow while parsing frame data. NVD rates the issue 9.8/Critical with the usual high-impact triad: remote attack vector, no privileges, no user interaction, and potential high confidentiality, integrity, and availability impact. The CVE description says the iss [truncated]

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7937

CVE-2016-7937 is a critical memory-corruption issue in tcpdump’s VAT parser. NVD describes it as a buffer overflow in print-udp.c:vat_print() affecting tcpdump versions through 4.8.1, with a CVSS 3.0 score of 9.8. The issue was publicly published on 2017-01-28 and later referenced by multiple vendor and distro advisories.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7936

CVE-2016-7936 is a critical memory-corruption issue in tcpdump's UDP parsing path. NVD assigns CVSS 3.0 9.8 and CWE-119, and the supplied record indicates tcpdump versions through 4.8.1 are affected, with 4.9.0 as the fixed release. Because tcpdump may be used on untrusted capture files or live traffic, affected deployments should be treated as urgent to remediate.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7935

CVE-2016-7935 is a critical memory-corruption issue in tcpdump’s RTP parser. According to NVD, tcpdump versions through 4.8.1 are affected, and the flaw is a buffer overflow in print-udp.c:rtp_print(). Because tcpdump processes network traffic, the issue is especially important anywhere packet capture or analysis is performed on untrusted input.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7933

CVE-2016-7933 is a critical buffer overflow in tcpdump's PPP parser, specifically in print-ppp.c:ppp_hdlc_if_print(). The issue was published on 2017-01-28 and is rated CVSS 3.0 9.8. NVD lists tcpdump versions up to 4.8.1 as vulnerable, while the CVE description says tcpdump before 4.9.0 is affected.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7932

CVE-2016-7932 is a critical tcpdump flaw in the PIM parser that can trigger a buffer overflow in print-pim.c:pimv2_check_checksum(). The NVD record identifies tcpdump versions through 4.8.1 as vulnerable and assigns a CVSS 3.0 score of 9.8, reflecting the potential for severe impact from malformed network traffic processed by tcpdump.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7931

CVE-2016-7931 is a critical buffer overflow in tcpdump’s MPLS parser. The flaw is in print-mpls.c:mpls_print() and affects tcpdump versions before 4.9.0. NVD rates the issue 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a high-impact vulnerability in affected deployments.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7930

CVE-2016-7930 is a critical memory-safety issue in tcpdump’s LLC/SNAP parser. The flaw is in print-llc.c:llc_print() and can lead to a buffer overflow when tcpdump processes crafted input. NVD rates the issue 9.8/10 and lists affected tcpdump versions through 4.8.1, with tcpdump 4.9.0 as the fixed release target referenced by the vulnerability description.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7929

CVE-2016-7929 describes a buffer overflow in tcpdump’s Juniper PPPoE ATM parser, specifically in print-juniper.c:juniper_parse_header(). NVD rates the issue Critical with a 9.8 CVSS score, and the record links to vendor and distro advisories indicating patched releases.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7928

CVE-2016-7928 is a critical memory-corruption issue in tcpdump’s IPComp parser. The CVE description identifies a buffer overflow in print-ipcomp.c:ipcomp_print(), and NVD rates the issue 9.8 with network attack vector, no privileges, and no user interaction. For defense, prioritize upgrading to fixed tcpdump builds and verifying any distribution backports before relying on package version numbers alone.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7927

CVE-2016-7927 is a critical memory-safety flaw in tcpdump’s IEEE 802.11 parsing path. According to NVD, the bug is a buffer overflow in print-802_11.c:ieee802_11_radio_print(), with a CVSS 3.0 score of 9.8 and attack conditions that require only network access, no privileges, and no user interaction. Systems running vulnerable tcpdump releases should be upgraded promptly to a fixed version.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7926

CVE-2016-7926 is a critical memory-corruption flaw in tcpdump’s Ethernet parsing code. When tcpdump processes crafted Ethernet-type data, the vulnerable parser path can overflow a buffer in print-ether.c:ethertype_print(), creating a high-risk condition for affected deployments. NVD rates the issue 9.8 (CVSS v3.0) and lists tcpdump 4.8.1 and earlier as affected.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7925

CVE-2016-7925 is a critical buffer overflow in tcpdump’s compressed SLIP parser, affecting versions before 4.9.0. The issue is identified in print-sl.c:sl_if_print() and was assigned a CVSS 3.0 score of 9.8, reflecting high-impact conditions with no privileges or user interaction required.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7924

CVE-2016-7924 describes a critical buffer overflow in tcpdump’s ATM parser, specifically in print-atm.c:oam_print(), affecting tcpdump versions before 4.9.0. NVD rates the issue CVSS 3.0 9.8 with network attack vector, no privileges required, and no user interaction, making patching or package replacement a high priority for anyone relying on tcpdump to inspect packet captures.

CRITICAL Tcpdump CVE published 2017-01-28

CVE-2016-7922

CVE-2016-7922 is a critical tcpdump flaw in the AH parser that can trigger a buffer overflow in print-ah.c:ah_print() while processing packet data. NVD rates it 9.8 with a network attack vector and no user interaction, and the vulnerable version range in the NVD CPE data extends through tcpdump 4.8.1. This should be treated as an immediate patch priority for any environment that parses untrusted traffic o [truncated]