The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniperparseheader().
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"234264056026321927470504702073393842305",
"52325095989268154129897589357186505211",
"268770971147915891867268879560444734893"
]
},
"id": "CVE-2017-13004-8dfcb5ea",
"source": "https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc",
"signature_type": "Line",
"target": {
"file": "print-juniper.c"
},
"signature_version": "v1",
"deprecated": false
},
{
"digest": {
"length": 6952.0,
"function_hash": "181019605112102346093767750243993717453"
},
"id": "CVE-2017-13004-c5123741",
"source": "https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc",
"signature_type": "Function",
"target": {
"file": "print-juniper.c",
"function": "juniper_parse_header"
},
"signature_version": "v1",
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-13004.json"