The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
http://www.debian.org/security/2017/dsa-3971
http://www.securitytracker.com/id/1039307
http://www.tcpdump.org/tcpdump-changes.txt
https://access.redhat.com/errata/RHEA-2018:0705
https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4
Source: MITRE
Published: 2017-09-14
Updated: 2019-10-03
Type: CWE-835
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH