Debian Security Advisory 1353-1 - It was discovered that an integer overflow in the BGP dissector of tcpdump, a powerful tool for network monitoring and data acquisition, may lead to the execution of arbitrary code.
ab436bdfac5ee125d75fd83842aa8be4f67bf4f3fe0108a2f49f67da00bdf4d1
FreeBSD Security Advisory - By crafting malicious BGP packets, an attacker could exploit a vulnerability in tcpdump allowing them to execute code or crash the process.
e33c611629e2f77744592e30f63eec2b9479350375ca2b84b50d8d02a47af1bd
Ubuntu Security Notice 492-1 - A flaw was discovered in the BGP dissector of tcpdump. Remote attackers could send specially crafted packets and execute arbitrary code with user privileges.
cba259508afc08cadaa8a296a8173b508113c5781280f8499b35f80117384cb5
Gentoo Linux Security Advisory GLSA 200707-14 - mu-b from Digital Labs discovered that the return value of a snprintf() call is not properly checked before being used. This could lead to an integer overflow. Versions less than 3.9.5-r3 are affected.
1c8620801048b4006c81388bc623603e25ca3a79e200f500d41fd2852a2418de
Mandriva Linux Security Advisory - An integer overflow in tcpdump could allow a remote attacker to execute arbitrary code via crafted TLVs in a BGP packet.
2f982f2161f3356e5da0b292f0f1e0ef5c469b4c2135e3c8610f27cd40edbfa1