{"id":"CVE-2017-13022","details":"The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().","modified":"2026-04-02T00:02:52.598624Z","published":"2017-09-14T06:29:02.030Z","related":["MGASA-2017-0335","SUSE-SU-2017:2854-1","SUSE-SU-2019:14191-1","openSUSE-SU-2024:11425-1"],"references":[{"type":"WEB","url":"https://support.apple.com/HT208221"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3971"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039307"},{"type":"ADVISORY","url":"http://www.tcpdump.org/tcpdump-changes.txt"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHEA-2018:0705"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201709-23"},{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/the-tcpdump-group/tcpdump","events":[{"introduced":"0"},{"last_affected":"993a67c8e648bc8b19881e29a60f41273cfbee7b"},{"fixed":"eee0b04bcfdae319c242b0b8fc3d07029ee65b8c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.9.1"}]}}],"versions":["tcpdump-3.5.1","tcpdump-3.5.2","tcpdump-3.6.1","tcpdump-3.6.2","tcpdump-3.6.3","tcpdump-3.7.1","tcpdump-3.7.2","tcpdump-3.8-bp","tcpdump-3.8.1","tcpdump-3.8.2","tcpdump-3.8.3","tcpdump-3.9.1","tcpdump-3.9.2","tcpdump-3.9.3","tcpdump-3.9.5","tcpdump-3.9.6","tcpdump-3.9.7","tcpdump-3.9.8","tcpdump-4.0.0","tcpdump-4.1.0","tcpdump-4.1.1","tcpdump-4.2.1","tcpdump-4.3.0","tcpdump-4.4.0","tcpdump-4.5.0","tcpdump-4.5.1","tcpdump-4.6.0","tcpdump-4.6.0-bp","tcpdump-4.6.1","tcpdump-4.7.0-bp","tcpdump-4.7.2","tcpdump-4.7.3","tcpdump-4.7.4","tcpdump-4.8.0","tcpdump-4.8.0-bp","tcpdump-4.8.1","tcpdump-4.9.0","tcpdump-4.9.0-bp","tcpdump-4.9.1"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c","signature_version":"v1","deprecated":false,"signature_type":"Function","id":"CVE-2017-13022-0362e827","digest":{"function_hash":"123165594716226374072612119953052349352","length":596},"target":{"function":"ip_printroute","file":"print-ip.c"}},{"source":"https://github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c","signature_version":"v1","deprecated":false,"signature_type":"Line","id":"CVE-2017-13022-be0f012a","digest":{"line_hashes":["1703503926721153439612063356669374998","55971060995458297747371627312930637408","191965866893899249307730362287328951213","335563951198771229787074253736712471194","146824962707302787888754114797462037914","293222358303371640007516707668731196863","168372040183320671483207524346582011066","91634231847505838765402727594796801311","198200953870990064268698389836458319698","16125893791757920208416590438974946885","87759674695105364466609514446082999806","86800151968258324071778690655352783368","40618759338100395877255223291350189937","138679264629610268822577515270853755742","317289161516197162683451545575295577304","222366130037876000739021390466277659386","274544525196487618876390350380502766706","37734716822424090496436291616264790154","44477331842281623064229501389099786701","286784534051773562457314809747096614509","44809046069123694497958311740991151102","198311724748209008650073301339093956168","99730768856670468546215193624344741958"],"threshold":0.9},"target":{"file":"print-ip.c"}},{"source":"https://github.com/the-tcpdump-group/tcpdump/commit/eee0b04bcfdae319c242b0b8fc3d07029ee65b8c","signature_version":"v1","deprecated":false,"signature_type":"Function","id":"CVE-2017-13022-bf791caf","digest":{"function_hash":"165226726622269549230475447364557567453","length":1226},"target":{"function":"ip_optprint","file":"print-ip.c"}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-13022.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}