First published: Sat Jan 28 2017(Updated: )
The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
tcpdump tcpdump | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7933 has a medium severity rating due to the potential for a buffer overflow which can lead to system crashes or exploitation.
To fix CVE-2016-7933, users should upgrade tcpdump to version 4.9.0 or later.
CVE-2016-7933 affects tcpdump versions prior to 4.9.0, specifically up to version 4.8.1.
CVE-2016-7933 specifically relates to a buffer overflow vulnerability in the PPP parser of tcpdump.
There are no confirmed reports of active exploitation of CVE-2016-7933, but it is recommended to apply patches to mitigate potential risks.