Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
http://www.ubuntu.com/usn/usn-492-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:148
http://www.debian.org/security/2007/dsa-1353
http://security.gentoo.org/glsa/glsa-200707-14.xml
http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc
http://bugs.gentoo.org/show_bug.cgi?id=184815
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
Source: Mitre, NVD
Published: 2007-07-16
Updated: 2025-04-09
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.74399