{"id":"CVE-2016-7932","details":"The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().","modified":"2026-04-11T17:12:11.797593Z","published":"2017-01-28T01:59:00.453Z","related":["MGASA-2017-0061","SUSE-SU-2017:1110-1","openSUSE-SU-2024:11425-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1037755"},{"type":"WEB","url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3775"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95852"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1871"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-30"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/the-tcpdump-group/tcpdump","events":[{"introduced":"0"},{"last_affected":"af974494da71f2dae8eeac40e1611db5d6a82668"}],"database_specific":{"cpe":"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"4.8.1"}],"source":"CPE_FIELD"}}],"versions":["tcpdump-3.5.1","tcpdump-3.6.1","tcpdump-3.7.1","tcpdump-3.8-bp","tcpdump-4.5.0","tcpdump-4.6.0","tcpdump-4.6.0-bp","tcpdump-4.7.0-bp","tcpdump-4.8.0-bp","tcpdump-4.8.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7932.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}