First published: Sat Jan 28 2017(Updated: )
A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
tcpdump tcpdump | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7993 is classified as a critical vulnerability due to its potential for causing buffer overflow attacks.
To fix CVE-2016-7993, you should upgrade tcpdump to version 4.9.0 or later.
Versions of tcpdump prior to 4.9.0, specifically up to and including 4.8.1, are affected by CVE-2016-7993.
CVE-2016-7993 can lead to buffer overflows in multiple protocol parsers, which may allow for arbitrary code execution.
Yes, there are known exploits associated with CVE-2016-7993 that leverage the buffer overflow vulnerability.