Vulnerability Database
Blog
FAQ
Docs
DSA-1353-1
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DSA-1353-1
Import Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-1353-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/DSA-1353-1
Related
CVE-2007-3798
Published
2007-08-08T00:00:00Z
Modified
2024-01-09T20:22:17.006420Z
Summary
tcpdump - integer overflow
Details
References
Affected packages
Debian:3.1
/
tcpdump
Package
Name
tcpdump
Purl
pkg:deb/debian/tcpdump?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
3.8.3-5sarge3
Affected versions
3.*
3.8.3-5
3.8.3-5sarge1
3.8.3-5sarge2
Debian:4.0
/
tcpdump
Package
Name
tcpdump
Purl
pkg:deb/debian/tcpdump?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
3.9.5-2etch1
Affected versions
3.*
3.9.5-2
DSA-1353-1 - OSV