Critical severity9.8NVD Advisory· Published Sep 14, 2017· Updated May 13, 2026
CVE-2017-13020
CVE-2017-13020
Description
The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
Affected products
4cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/the-tcpdump-group/tcpdump/commit/c5dd7bef5e54da5996dc4713284aa6266ae75b75nvdIssue TrackingPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3971nvdThird Party Advisory
- www.securitytracker.com/id/1039307nvdThird Party AdvisoryVDB Entry
- www.tcpdump.org/tcpdump-changes.txtnvdVendor Advisory
- access.redhat.com/errata/RHEA-2018:0705nvdThird Party Advisory
- github.com/the-tcpdump-group/tcpdump/commit/d692d67332bcc90540088ad8e725eb3279e39863nvdIssue TrackingThird Party Advisory
- security.gentoo.org/glsa/201709-23nvdThird Party Advisory
- support.apple.com/HT208221nvdThird Party Advisory
News mentions
0No linked articles in our index yet.