Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
CVE-2017-13051
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2017-13051
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-13051.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-13051
Downstream
DLA-1097-1
DSA-3971-1
RHEA-2018:0705
SUSE-SU-2017:2854-1
SUSE-SU-2019:14191-1
UBUNTU-CVE-2017-13051
USN-3415-1
openSUSE-SU-2024:11425-1
Related
MGASA-2017-0335
SUSE-SU-2017:2854-1
SUSE-SU-2019:14191-1
openSUSE-SU-2024:11425-1
Published
2017-09-14T06:29:03Z
Modified
2025-09-24T08:41:57.048714Z
Severity
9.8 (Critical)
CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp
obj
print().
References
http://www.debian.org/security/2017/dsa-3971
http://www.securitytracker.com/id/1039307
http://www.tcpdump.org/tcpdump-changes.txt
https://access.redhat.com/errata/RHEA-2018:0705
https://github.com/the-tcpdump-group/tcpdump/commit/289c672020280529fd382f3502efab7100d638ec
https://security.gentoo.org/glsa/201709-23
https://support.apple.com/HT208221
Affected packages
Git
/
github.com/the-tcpdump-group/tcpdump
Affected ranges
Type
GIT
Repo
https://github.com/the-tcpdump-group/tcpdump
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
289c672020280529fd382f3502efab7100d638ec
Affected versions
tcpdump-3.*
tcpdump-3.5.1
tcpdump-3.6.1
tcpdump-3.7.1
tcpdump-3.8-bp
tcpdump-4.*
tcpdump-4.5.0
tcpdump-4.6.0
tcpdump-4.6.0-bp
tcpdump-4.7.0-bp
tcpdump-4.9.0-bp
CVE-2017-13051 - OSV