CVE-2016-7938

Published on: 01/27/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Tcpdump from Tcpdump contain the following vulnerability:

The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().

  • CVE-2016-7938 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Debian -- Security Information -- DSA-3775-1 tcpdump www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3775
tcpdump: Multiple vulnerabilities (GLSA 201702-30) — Gentoo Security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201702-30
Bug#852744: unblock: tcpdump/4.9.0-1 Issue Tracking
Mailing List
Third Party Advisory
www.mail-archive.com
text/html
URL Logo CONFIRM www.mail-archive.com/[email protected]/msg1494526.html
tcpdump Multiple Buffer Overflow Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 95852
Tcpdump Multiple Flaws Let Remote Users Deny Service and Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1037755
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2017:1871

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationTcpdumpTcpdumpAllAllAllAll
  • cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*: