Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().
[
{
"source": "https://github.com/the-tcpdump-group/tcpdump/commit/9f0730bee3eb65d07b49fd468bc2f269173352fe",
"id": "CVE-2017-13011-1beb20ce",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "bittok2str_internal",
"file": "util-print.c"
},
"signature_type": "Function",
"digest": {
"length": 640.0,
"function_hash": "150656433806866255981651568793316878034"
}
},
{
"source": "https://github.com/the-tcpdump-group/tcpdump/commit/9f0730bee3eb65d07b49fd468bc2f269173352fe",
"id": "CVE-2017-13011-d2d24c8b",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "util-print.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"231859840568601637670309716207925301090",
"251899933247883906475483114841213629230",
"334300450573295055465511432614243382047",
"255783323586146134653739915876960100821",
"68432710074644361055321932845156872648",
"263706125093159154822048266658689796940",
"229730716787724290552726203931709779829",
"78643818154826121419433867182118532335",
"34602542859758931094714437192703027519",
"173957243085141759134029452467774283903",
"268299756439329232036612279344528023631",
"96266708519662925728637672742187334640",
"116456259177446176655362005946127778726",
"73755450793679249896887187582708761848"
]
}
}
]