{"id":"CVE-2017-12985","details":"The IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().","modified":"2026-04-16T01:43:39.424740351Z","published":"2017-09-14T06:29:00.590Z","related":["SUSE-SU-2017:2854-1","SUSE-SU-2019:14191-1","openSUSE-SU-2024:11425-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1039307"},{"type":"WEB","url":"https://support.apple.com/HT208221"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3971"},{"type":"ADVISORY","url":"http://www.tcpdump.org/tcpdump-changes.txt"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHEA-2018:0705"},{"type":"ADVISORY","url":"https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201709-23"},{"type":"REPORT","url":"https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f"},{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/the-tcpdump-group/tcpdump","events":[{"introduced":"0"},{"fixed":"66df248b49095c261138b5a5e34d341a6bf9ac7f"}]}],"versions":["tcpdump-3.5.1","tcpdump-3.6.1","tcpdump-3.7.1","tcpdump-3.8-bp","tcpdump-4.5.0","tcpdump-4.6.0","tcpdump-4.6.0-bp","tcpdump-4.7.0-bp","tcpdump-4.9.0-bp"],"database_specific":{"vanir_signatures":[{"digest":{"line_hashes":["329357316900423219182803092609125885853","187436231855345951100735712027368965278","320712357575833600979748096067006272547","282589018150683854520773903877271280560","205555667095811577949446909573802156001","113860402000933496282600718845317829043","337650887235417164082750349992551919895","173051048066303299450358716930202006094","143024854602937602297593958374456675102","61966574091318972904003245846346179336","133839400262504972296657419712161026263","323099838089759618558971767782366436122","90527631626152371348089329872529910848","234645694689860118065036478087340115874","72126145160298499555997657451414016195","211466904419801456136574012225558291433","33980464592361238179255276689847590787","197157377982268151628380897928983319726","63345640709182781353404072402272129882","126312167875054592672414926294694574736","69910482746023931902407474210156233552","89232713943518421841799565967472437463"],"threshold":0.9},"source":"https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f","target":{"file":"print-ip6.c"},"signature_version":"v1","signature_type":"Line","deprecated":false,"id":"CVE-2017-12985-166ddcbb"},{"digest":{"line_hashes":["281509564500826239494950034711445233155","190609416096967775519926632994143017179"],"threshold":0.9},"source":"https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f","target":{"file":"print-mobility.c"},"signature_version":"v1","signature_type":"Line","deprecated":false,"id":"CVE-2017-12985-aec91162"},{"signature_version":"v1","source":"https://github.com/the-tcpdump-group/tcpdump/commit/66df248b49095c261138b5a5e34d341a6bf9ac7f","target":{"function":"ip6_print","file":"print-ip6.c"},"signature_type":"Function","id":"CVE-2017-12985-f2297c56","deprecated":false,"digest":{"length":3973,"function_hash":"169330906075847559816538962733623101211"}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-12985.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}