The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().
{ "vanir_signatures": [ { "source": "https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125", "deprecated": false, "signature_version": "v1", "digest": { "function_hash": "249449000474338159132286175935987832010", "length": 926.0 }, "signature_type": "Function", "id": "CVE-2017-13031-6be3a48c", "target": { "function": "frag6_print", "file": "print-frag6.c" } }, { "source": "https://github.com/the-tcpdump-group/tcpdump/commit/2d669862df7cd17f539129049f6fb70d17174125", "deprecated": false, "signature_version": "v1", "digest": { "line_hashes": [ "212234958766796697032698289877259867767", "65964685045951631495872603834156534696", "6176987505694048708101376711871407365", "46494900475245500499264915132677012018" ], "threshold": 0.9 }, "signature_type": "Line", "id": "CVE-2017-13031-74444da4", "target": { "file": "print-frag6.c" } } ] }