Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2017-11542
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2017-11542
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11542.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-11542
Downstream
DEBIAN-CVE-2017-11542
DLA-1090-1
DSA-3971-1
RHEA-2018:0705
SUSE-SU-2017:2690-1
SUSE-SU-2017:2854-1
UBUNTU-CVE-2017-11542
USN-3415-1
openSUSE-SU-2024:11425-1
Related
MGASA-2017-0335
SUSE-SU-2017:2690-1
SUSE-SU-2017:2854-1
openSUSE-SU-2024:11425-1
Published
2017-07-23T03:29:00Z
Modified
2025-10-13T06:53:25.692326Z
Severity
9.8 (Critical)
CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
References
http://www.debian.org/security/2017/dsa-3971
http://www.securityfocus.com/bid/99940
https://access.redhat.com/errata/RHEA-2018:0705
https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim
https://security.gentoo.org/glsa/201709-23
http://www.securitytracker.com/id/1039307
https://support.apple.com/HT208221
Affected packages
Git
/
github.com/the-tcpdump-group/tcpdump
Affected ranges
Type
GIT
Repo
https://github.com/the-tcpdump-group/tcpdump
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Last affected
cae54f4d943f163541dc7a90f7f5b432859955e4
Affected versions
tcpdump-3.*
tcpdump-3.5.1
tcpdump-3.6.1
tcpdump-3.7.1
tcpdump-3.8-bp
tcpdump-4.*
tcpdump-4.5.0
tcpdump-4.6.0
tcpdump-4.6.0-bp
tcpdump-4.7.0-bp
tcpdump-4.9.0-bp
CVE-2017-11542 - OSV