Critical severity9.8NVD Advisory· Published Sep 14, 2017· Updated May 13, 2026
CVE-2017-13004
CVE-2017-13004
Description
The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
Affected products
4cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bcnvdIssue TrackingPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3971nvdThird Party Advisory
- www.securitytracker.com/id/1039307nvdThird Party AdvisoryVDB Entry
- www.tcpdump.org/tcpdump-changes.txtnvdVendor Advisory
- access.redhat.com/errata/RHEA-2018:0705nvdThird Party Advisory
- github.com/the-tcpdump-group/tcpdump/commit/35d146b7a66496d72cdeb95ccb33ab80a265ce90nvdIssue TrackingThird Party Advisory
- security.gentoo.org/glsa/201709-23nvdThird Party Advisory
- support.apple.com/HT208221nvdThird Party Advisory
News mentions
0No linked articles in our index yet.