tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 03:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.debian.org/security/2017/dsa-3971 - | |
| References | () http://www.securityfocus.com/bid/99939 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1039307 - | |
| References | () https://access.redhat.com/errata/RHEA-2018:0705 - | |
| References | () https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl - Exploit, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/201709-23 - | |
| References | () https://support.apple.com/HT208221 - | 
Information
                Published : 2017-07-23 03:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11543
Mitre link : CVE-2017-11543
CVE.ORG link : CVE-2017-11543
JSON object : View
Products Affected
                tcpdump
- tcpdump
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
