Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 624652 (CVE-2017-11108)

Summary: <net-analyzer/tcpdump-4.9.1: heap-based buffer over-read and application crash (CVE-2017-11108)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: gentoo, netmon
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B3 [glsa cve]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2017-07-12 07:35:40 UTC
CVE-2017-11108 (https://nvd.nist.gov/vuln/detail/CVE-2017-11108):

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-09-25 03:35:28 UTC
Fixed upstream by commit 

https://github.com/the-tcpdump-group/tcpdump/pull/617


Adding to a existing GLSA Request.

@Security please add cve to database.

Gentoo Security Padawan
ChrisADR
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2017-09-25 11:55:58 UTC
This issue was resolved and addressed in
 GLSA 201709-23 at https://security.gentoo.org/glsa/201709-23
by GLSA coordinator Aaron Bauman (b-man).