Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-3798
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-16 Jul, 2007 | 22:30
Updated At-15 Oct, 2024 | 15:35

Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

tcpdump & libpcap
tcpdump
>>tcpdump>>Versions up to 3.9.6(inclusive)
cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>6.10
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>7.04
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>3.1
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>4.0
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>9.0
cpe:2.3:a:slackware:slackware:9.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>9.1
cpe:2.3:a:slackware:slackware:9.1:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>10.0
cpe:2.3:a:slackware:slackware:10.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>10.1
cpe:2.3:a:slackware:slackware:10.1:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>10.2
cpe:2.3:a:slackware:slackware:10.2:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>11.0
cpe:2.3:a:slackware:slackware:11.0:*:*:*:*:*:*:*
Slackware
slackware
>>slackware>>12.0
cpe:2.3:a:slackware:slackware:12.0:*:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>Versions from 5.0(inclusive) to 5.5(exclusive)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>Versions from 6.0(inclusive) to 6.1(exclusive)
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p11:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p12:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p13:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p14:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p3:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p5:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p7:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p8:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>5.5
cpe:2.3:o:freebsd:freebsd:5.5:p9:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p10:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p11:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p12:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p13:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p16:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p17:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p18:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p2:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p6:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p7:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.1
cpe:2.3:o:freebsd:freebsd:6.1:p9:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.2
cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.2
cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.2
cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.2
cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*
FreeBSD Foundation
freebsd
>>freebsd>>6.2
cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*
Apple Inc.
apple
>>mac_os_x>>Versions from 10.0.0(inclusive) to 10.4.11(exclusive)
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>mac_os_x_server>>Versions from 10.0.0(inclusive) to 10.4.11(exclusive)
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-252Primarynvd@nist.gov
CWE-252Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-07-31T00:00:00

This issue does not affect the version of tcpdump shipped in Red Hat Enterprise Linux 2.1 or 3. Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250275 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References
HyperlinkSourceResource
http://bugs.gentoo.org/show_bug.cgi?id=184815cve@mitre.org
Third Party Advisory
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12cve@mitre.org
Broken Link
http://docs.info.apple.com/article.html?artnum=307179cve@mitre.org
Broken Link
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlcve@mitre.org
Mailing List
http://secunia.com/advisories/26135cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26168cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26223cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26231cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26263cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26266cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26286cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26395cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26404cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/26521cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/27580cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/28136cve@mitre.org
Broken Link
Vendor Advisory
http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asccve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200707-14.xmlcve@mitre.org
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313cve@mitre.org
Mailing List
Patch
http://www.debian.org/security/2007/dsa-1353cve@mitre.org
Third Party Advisory
http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.ccve@mitre.org
Exploit
http://www.mandriva.com/security/advisories?name=MDKSA-2007:148cve@mitre.org
Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_16_sr.htmlcve@mitre.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0368.htmlcve@mitre.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0387.htmlcve@mitre.org
Broken Link
Vendor Advisory
http://www.securityfocus.com/archive/1/474225/100/0/threadedcve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/24965cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1018434cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.trustix.org/errata/2007/0023/cve@mitre.org
Broken Link
http://www.turbolinux.com/security/2007/TLSA-2007-46.txtcve@mitre.org
Broken Link
http://www.ubuntu.com/usn/usn-492-1cve@mitre.org
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA07-352A.htmlcve@mitre.org
Broken Link
Third Party Advisory
US Government Resource
http://www.vupen.com/english/advisories/2007/2578cve@mitre.org
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2007/4238cve@mitre.org
Broken Link
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771cve@mitre.org
Broken Link
Change History
0Changes found

Details not found