### [CVE-2017-5342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). ### POC #### Reference - https://hackerone.com/reports/202968 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/RClueX/Hackerone-Reports - https://github.com/geeknik/cve-fuzzing-poc - https://github.com/imhunterand/hackerone-publicy-disclosed