First published: Sat Jan 28 2017(Updated: )
Multiple buffer overflows, and one integer overflow, in protocol decoding were found that may cause incorrect decoding, segmentation fault or (in the case of integer overflow) an infinite loop. These issues can be be exploited either locally, by making the target user decode a crafted .pcap file using tcpdump, or remotely by sending crafted packets to the network segment where the target system is running tcpdump decoding the live packet capture. Ability to send crafted packets to the target network segment is limited by the protocols' ability to cross network segments, or presence of firewall rules. Upstream changelog: <a href="http://www.tcpdump.org/tcpdump-changes.txt">http://www.tcpdump.org/tcpdump-changes.txt</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tcpdump | <4.9.0 | 4.9.0 |
tcpdump tcpdump | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7922 has been classified as having medium severity due to its potential to cause segmentation faults and infinite loops.
To fix CVE-2016-7922, upgrade tcpdump to version 4.9.0 or later.
CVE-2016-7922 is associated with multiple buffer overflows and one integer overflow within protocol decoding.
CVE-2016-7922 can be exploited locally when the target user decodes a crafted .pcap file.
CVE-2016-7922 affects tcpdump versions up to and including 4.8.1, with an upgrade required to version 4.9.0.