Multiple out of bounds read and integer overflow vulnerabilities found in tcpdump, affecting protocol decoding. Attackers could manipulate packets to cause incorrect data display, crashes, or infinite loops. Use "-w" option for unattended packet capture to mitigate the flaws
Reporter | Title | Published | Views | Family All 65 |
---|---|---|---|---|
![]() | CVE-2016-7924 | 28 Jan 201701:59 | – | osv |
![]() | tcpdump - security update | 30 Jan 201700:00 | – | osv |
![]() | tcpdump - security update | 29 Jan 201700:00 | – | osv |
![]() | RHSA-2017:1871 Red Hat Security Advisory: tcpdump security, bug fix, and enhancement update | 16 Sep 202400:02 | – | osv |
![]() | OPENSUSE-SU-2024:11425-1 tcpdump-4.99.1-1.2 on GA media | 15 Jun 202400:00 | – | osv |
![]() | CVE-2016-7924 | 28 Jan 201701:59 | – | nvd |
![]() | CVE-2016-7924 | 27 Jan 201700:00 | – | ubuntucve |
![]() | CVE-2016-7924 | 28 Jan 201701:59 | – | cve |
![]() | Buffer overflow | 28 Jan 201701:59 | – | prion |
![]() | CVE-2016-7924 | 28 Jan 201701:33 | – | cvelist |
Source | Link |
---|---|
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo