{"id":"CVE-2016-7937","details":"The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().","modified":"2026-03-15T14:23:07.094264Z","published":"2017-01-28T01:59:00.607Z","related":["MGASA-2017-0061","SUSE-SU-2017:0656-1","SUSE-SU-2017:1110-1","openSUSE-SU-2024:11425-1"],"references":[{"type":"WEB","url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1037755"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3775"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95852"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1871"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-30"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/the-tcpdump-group/tcpdump","events":[{"introduced":"0"},{"last_affected":"af974494da71f2dae8eeac40e1611db5d6a82668"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.8.1"}]}}],"versions":["tcpdump-3.5.1","tcpdump-3.6.1","tcpdump-3.7.1","tcpdump-3.8-bp","tcpdump-4.5.0","tcpdump-4.6.0","tcpdump-4.6.0-bp","tcpdump-4.7.0-bp","tcpdump-4.8.0-bp","tcpdump-4.8.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7937.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}