logo
DATABASE RESOURCES PRICING ABOUT US

tcpdump - security update

Description

Multiple vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service or the execution of arbitrary code. * [CVE-2016-7922](https://security-tracker.debian.org/tracker/CVE-2016-7922) Buffer overflow in parser. * [CVE-2016-7923](https://security-tracker.debian.org/tracker/CVE-2016-7923) Buffer overflow in parser. * [CVE-2016-7924](https://security-tracker.debian.org/tracker/CVE-2016-7924) Buffer overflow in parser. * [CVE-2016-7925](https://security-tracker.debian.org/tracker/CVE-2016-7925) Buffer overflow in parser. * [CVE-2016-7926](https://security-tracker.debian.org/tracker/CVE-2016-7926) Buffer overflow in parser. * [CVE-2016-7927](https://security-tracker.debian.org/tracker/CVE-2016-7927) Buffer overflow in parser. * [CVE-2016-7928](https://security-tracker.debian.org/tracker/CVE-2016-7928) Buffer overflow in parser. * [CVE-2016-7929](https://security-tracker.debian.org/tracker/CVE-2016-7929) Buffer overflow in parser. * [CVE-2016-7930](https://security-tracker.debian.org/tracker/CVE-2016-7930) Buffer overflow in parser. * [CVE-2016-7931](https://security-tracker.debian.org/tracker/CVE-2016-7931) Buffer overflow in parser. * [CVE-2016-7932](https://security-tracker.debian.org/tracker/CVE-2016-7932) Buffer overflow in parser. * [CVE-2016-7933](https://security-tracker.debian.org/tracker/CVE-2016-7933) Buffer overflow in parser. * [CVE-2016-7934](https://security-tracker.debian.org/tracker/CVE-2016-7934) Buffer overflow in parser. * [CVE-2016-7935](https://security-tracker.debian.org/tracker/CVE-2016-7935) Buffer overflow in parser. * [CVE-2016-7936](https://security-tracker.debian.org/tracker/CVE-2016-7936) Buffer overflow in parser. * [CVE-2016-7937](https://security-tracker.debian.org/tracker/CVE-2016-7937) Buffer overflow in parser. * [CVE-2016-7938](https://security-tracker.debian.org/tracker/CVE-2016-7938) Buffer overflow in parser. * [CVE-2016-7939](https://security-tracker.debian.org/tracker/CVE-2016-7939) Buffer overflow in parser. * [CVE-2016-7940](https://security-tracker.debian.org/tracker/CVE-2016-7940) Buffer overflow in parser. * [CVE-2016-7973](https://security-tracker.debian.org/tracker/CVE-2016-7973) Buffer overflow in parser. * [CVE-2016-7974](https://security-tracker.debian.org/tracker/CVE-2016-7974) Buffer overflow in parser. * [CVE-2016-7975](https://security-tracker.debian.org/tracker/CVE-2016-7975) Buffer overflow in parser. * [CVE-2016-7983](https://security-tracker.debian.org/tracker/CVE-2016-7983) Buffer overflow in parser. * [CVE-2016-7984](https://security-tracker.debian.org/tracker/CVE-2016-7984) Buffer overflow in parser. * [CVE-2016-7985](https://security-tracker.debian.org/tracker/CVE-2016-7985) Buffer overflow in parser. * [CVE-2016-7986](https://security-tracker.debian.org/tracker/CVE-2016-7986) Buffer overflow in parser. * [CVE-2016-7992](https://security-tracker.debian.org/tracker/CVE-2016-7992) Buffer overflow in parser. * [CVE-2016-7993](https://security-tracker.debian.org/tracker/CVE-2016-7993) Buffer overflow in parser. * [CVE-2016-8574](https://security-tracker.debian.org/tracker/CVE-2016-8574) Buffer overflow in parser. * [CVE-2016-8575](https://security-tracker.debian.org/tracker/CVE-2016-8575) Buffer overflow in parser. * [CVE-2017-5202](https://security-tracker.debian.org/tracker/CVE-2017-5202) Buffer overflow in parser. * [CVE-2017-5203](https://security-tracker.debian.org/tracker/CVE-2017-5203) Buffer overflow in parser. * [CVE-2017-5204](https://security-tracker.debian.org/tracker/CVE-2017-5204) Buffer overflow in parser. * [CVE-2017-5205](https://security-tracker.debian.org/tracker/CVE-2017-5205) Buffer overflow in parser. * [CVE-2017-5341](https://security-tracker.debian.org/tracker/CVE-2017-5341) Buffer overflow in parser. * [CVE-2017-5342](https://security-tracker.debian.org/tracker/CVE-2017-5342) Buffer overflow in parser. * [CVE-2017-5482](https://security-tracker.debian.org/tracker/CVE-2017-5482) Buffer overflow in parser. * [CVE-2017-5483](https://security-tracker.debian.org/tracker/CVE-2017-5483) Buffer overflow in parser. * [CVE-2017-5484](https://security-tracker.debian.org/tracker/CVE-2017-5484) Buffer overflow in parser. * [CVE-2017-5485](https://security-tracker.debian.org/tracker/CVE-2017-5485) Buffer overflow in parser. * [CVE-2017-5486](https://security-tracker.debian.org/tracker/CVE-2017-5486) Buffer overflow in parser. For Debian 7 Wheezy, these problems have been fixed in version 4.9.0-1~deb7u1. We recommend that you upgrade your tcpdump packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
tcpdump 4.7.4-1
tcpdump 4.7.4-3
tcpdump 4.7.4-1~bpo8+1
tcpdump 4.6.2-2
tcpdump 4.4.0-1
tcpdump 4.6.1-2
tcpdump 4.3.0-1
tcpdump 4.3.0-1+deb7u2
tcpdump 4.3.0-1+deb7u1
tcpdump 4.6.1-1
tcpdump 4.5.1-1
tcpdump 4.6.2-1
tcpdump 4.8.1-1
tcpdump 4.7.4-1~bpo70+1
tcpdump 4.7.4-2
tcpdump 4.6.2-4
tcpdump 4.6.2-3
tcpdump 4.8.1-2
tcpdump 4.6.1-3
tcpdump 4.5.1-2
tcpdump 4.6.2-5

Related