CVE-2007-3798
Published Jul 16, 2007
Last updated a month ago
Overview
- Description
- Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Vendor comments
- Red HatThis issue does not affect the version of tcpdump shipped in Red Hat Enterprise Linux 2.1 or 3. Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250275 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BFFEF20-AB6E-4D82-81A9-B7AED327540C", "versionEndIncluding": "3.9.6" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:slackware:slackware:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "399C55D7-0D4D-4D1F-B0C0-5BEF084BBFA7" }, { "criteria": "cpe:2.3:a:slackware:slackware:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "644AEB96-EABA-4637-8C51-6E8AE7BB7299" }, { "criteria": "cpe:2.3:a:slackware:slackware:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "258358F0-DC55-44D8-9440-C803C8C5FDC7" }, { "criteria": "cpe:2.3:a:slackware:slackware:10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "653831E7-C117-4CD7-ADA4-11E6FE15A897" }, { "criteria": "cpe:2.3:a:slackware:slackware:10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1BACED6-11B1-44C7-82CC-AAD7C424112E" }, { "criteria": "cpe:2.3:a:slackware:slackware:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BE76350-E2BF-499C-BC2B-A82ADCC20037" }, { "criteria": "cpe:2.3:a:slackware:slackware:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FD92835-0C55-4FD8-9808-393AC77F45B6" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C25C4C48-0C37-4B55-9124-4D3EFA6A7B98", "versionEndExcluding": "5.5", "versionStartIncluding": "5.0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CD4018D-F0ED-407F-8C94-CD6095871948", "versionEndExcluding": "6.1", "versionStartIncluding": "6.0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E63AC19-08C0-476A-B557-0CCC24A4DC88" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46589B30-1A6C-4764-BBC5-969E2BE82F65" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3565238-C0D8-4196-BE25-5A0E9CB18F07" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEBA213-0CE9-4C14-B543-02323421698B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33229F64-E6CA-436B-A495-C753CF268068" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF3D3B09-4505-4FBE-BD78-CF106530B9F7" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB8ED096-29AB-4509-92C9-E9AA9D3653FE" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6751AB8-2F96-45CE-A2B1-F13621599009" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA3B6BBC-3EA2-445B-94B1-B079ABB0B22D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44136741-534D-4D3B-83E2-E1D2D367953B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5050EAD4-3635-4EBA-BA53-3CCF4D291269" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C21700B9-9A63-41C2-92AA-3F4FB9DA68C0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.5:p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DE96008-FDC8-480A-B144-079086CCCE29" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B513BA9C-C121-4DCB-912F-529727217E8C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25273989-AC00-4649-BEAE-68F27DA09E15" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F756D1C-1DF7-484E-8A28-FE4886EC8DA7" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CA31CA1-A913-4E5B-A38B-F39A734602DB" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4439012-E5BD-4D24-8E37-B78368AFFCDD" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11CDF5CE-C4E8-4DEF-A1FC-C6FF8386D227" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF0868FD-2166-4C97-BA26-AB04FFDD53D3" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p17:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9D30D8B-0A80-4D57-BC7A-6E948CD03E61" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p18:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C40E1F-F185-4FBF-A93D-86222DBE4BC1" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB7A908F-7983-479D-B17F-5E8C0DB1E2B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1057593-E615-45AE-AFED-BEB83BBA8B03" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF6AEE8-F623-4DAF-88D6-D2996C3E4371" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "644CDF2C-D0E2-47CC-B891-50F75FE9AD41" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.1:p9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B7A0851-82B7-4AFE-B497-143770AC2BEF" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99009B85-61C6-4113-B3EF-40B8F330B65C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34B2D56E-32CE-4892-958A-CE339F69D63C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBCED956-7969-40E0-8E45-8A8DB8C4473F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "285D90AC-242A-403F-BB38-A52459523B4A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7749CCD-6474-4E81-8C08-F44EF0C306A9" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F5DEE66-117C-4844-8FD4-065D0820A808", "versionEndExcluding": "10.4.11", "versionStartIncluding": "10.0.0" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9ACE85A-56A0-404C-AB58-A4F5CA73243C", "versionEndExcluding": "10.4.11", "versionStartIncluding": "10.0.0" } ], "operator": "OR" } ] } ]