← Back
CVE-2017-5202
critical
CVSS 9.8
The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
Summary
The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
AI summary snake-internal / snake-template-v1
A weakness called CVE-2017-5202 was discovered in The ISO CLNS parser in tcpdump.
In plain terms, it is a flaw that writes outside the safe memory area.
Severity is Critical (CVSS 9.8/10). If exploited, attackers can fully take over the affected system.
What you should do: update the affected software to the latest version. If unsure, ask your IT team or search the vendor's site for "The ISO CLNS parser in tcpdump CVE-2017-5202".
CVE-2017-5202 (The ISO CLNS parser in tcpdump). Severity: Critical / CVSSv3 9.8. Category: CWE-119.
Response plan:
1. Check the vendor advisory for affected versions and the patched release.
2. If a vulnerable version is running in production, schedule maintenance (urgency from KEV/CVSS).
3. If no patch yet, mitigate via WAF rule, disabling the affected feature, etc.
4. Monitor logs / SIEM for known IOC and PoC signatures of this CVE.
PoCs and fix commits: see the 'References' section, MITRE, and NVD.
❓ What is the problem
A weakness (CVE-2017-5202) in The ISO CLNS parser in tcpdump. In plain words, it is a flaw that writes outside the safe memory area.
📍 Affected scope
Target versions of The ISO CLNS parser in tcpdump (see vendor advisory). If running in production, identify exposure immediately.
🔥 Severity
Severity: Critical (CVSS 9.8/10). If exploited, attackers can fully take over the affected system.
🔧 How to fix
Update to the patched release as listed in the vendor advisory. (Typical mitigation pattern for CWE-119)
🛡️ Workaround
If a patch is not yet available, consider disabling the affected feature, applying WAF rules, blocking via network ACLs, or isolating the vulnerable version.
🔍 Detection
Check version information, scan dependencies via SBOM, and monitor SIEM for IOC and PoC signatures related to this CVE.
References
- advisory af854a3a-2127-422b-91ae-364da2661108
- advisory af854a3a-2127-422b-91ae-364da2661108
- advisory af854a3a-2127-422b-91ae-364da2661108
- advisory af854a3a-2127-422b-91ae-364da2661108
- advisory af854a3a-2127-422b-91ae-364da2661108
- web af854a3a-2127-422b-91ae-364da2661108