vulnerability
Arch Linux: Arbitrary code execution (CVE-2016-7973)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jan 28, 2017 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jan 28, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
Solution
arch-linux-upgrade-latest
References
- CVE-2016-7973
- https://attackerkb.com/topics/CVE-2016-7973
- URL-http://www.debian.org/security/2017/dsa-3775
- URL-http://www.securityfocus.com/bid/95852
- URL-http://www.securitytracker.com/id/1037755
- URL-https://access.redhat.com/errata/RHSA-2017:1871
- URL-https://security.archlinux.org/ASA-201702-1
- URL-https://security.gentoo.org/glsa/201702-30
- URL-https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html
- URL-https://www.mail-archive.com/[email protected]/msg1494526.html
- CWE-119
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.