<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tcpdump</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2875-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-10-27T18:41:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-10-27T18:41:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-10-27T18:41:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tcpdump</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tcpdump to version 4.9.2 fixes several issues.

These security issues were fixed:

- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:2875-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tcpdump-4.9.2-9.1">
      <FullProductName ProductID="tcpdump-4.9.2-9.1">tcpdump-4.9.2-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tcpdump-4.9.2-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tcpdump-4.9.2-9.1">tcpdump-4.9.2-9.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tcpdump-4.9.2-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:tcpdump-4.9.2-9.1">tcpdump-4.9.2-9.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.</Note>
    </Notes>
    <CVE>CVE-2017-11108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11108.html</URL>
        <Description>CVE-2017-11108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047873</URL>
        <Description>SUSE Bug 1047873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.</Note>
    </Notes>
    <CVE>CVE-2017-11541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11541.html</URL>
        <Description>CVE-2017-11541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.</Note>
    </Notes>
    <CVE>CVE-2017-11542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11542.html</URL>
        <Description>CVE-2017-11542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.</Note>
    </Notes>
    <CVE>CVE-2017-11543</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11543.html</URL>
        <Description>CVE-2017-11543</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().</Note>
    </Notes>
    <CVE>CVE-2017-12893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12893.html</URL>
        <Description>CVE-2017-12893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().</Note>
    </Notes>
    <CVE>CVE-2017-12894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12894.html</URL>
        <Description>CVE-2017-12894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().</Note>
    </Notes>
    <CVE>CVE-2017-12895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12895.html</URL>
        <Description>CVE-2017-12895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().</Note>
    </Notes>
    <CVE>CVE-2017-12896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12896.html</URL>
        <Description>CVE-2017-12896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().</Note>
    </Notes>
    <CVE>CVE-2017-12897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12897.html</URL>
        <Description>CVE-2017-12897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply().</Note>
    </Notes>
    <CVE>CVE-2017-12898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12898.html</URL>
        <Description>CVE-2017-12898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().</Note>
    </Notes>
    <CVE>CVE-2017-12899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12899.html</URL>
        <Description>CVE-2017-12899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().</Note>
    </Notes>
    <CVE>CVE-2017-12900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12900.html</URL>
        <Description>CVE-2017-12900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().</Note>
    </Notes>
    <CVE>CVE-2017-12901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12901.html</URL>
        <Description>CVE-2017-12901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-12902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12902.html</URL>
        <Description>CVE-2017-12902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().</Note>
    </Notes>
    <CVE>CVE-2017-12985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12985.html</URL>
        <Description>CVE-2017-12985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().</Note>
    </Notes>
    <CVE>CVE-2017-12986</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12986.html</URL>
        <Description>CVE-2017-12986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().</Note>
    </Notes>
    <CVE>CVE-2017-12987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12987.html</URL>
        <Description>CVE-2017-12987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().</Note>
    </Notes>
    <CVE>CVE-2017-12988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12988.html</URL>
        <Description>CVE-2017-12988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().</Note>
    </Notes>
    <CVE>CVE-2017-12989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12989.html</URL>
        <Description>CVE-2017-12989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-12990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12990.html</URL>
        <Description>CVE-2017-12990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().</Note>
    </Notes>
    <CVE>CVE-2017-12991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12991.html</URL>
        <Description>CVE-2017-12991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().</Note>
    </Notes>
    <CVE>CVE-2017-12992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12992.html</URL>
        <Description>CVE-2017-12992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-12993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12993.html</URL>
        <Description>CVE-2017-12993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().</Note>
    </Notes>
    <CVE>CVE-2017-12994</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12994.html</URL>
        <Description>CVE-2017-12994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().</Note>
    </Notes>
    <CVE>CVE-2017-12995</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12995.html</URL>
        <Description>CVE-2017-12995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().</Note>
    </Notes>
    <CVE>CVE-2017-12996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12996.html</URL>
        <Description>CVE-2017-12996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().</Note>
    </Notes>
    <CVE>CVE-2017-12997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12997.html</URL>
        <Description>CVE-2017-12997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().</Note>
    </Notes>
    <CVE>CVE-2017-12998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12998.html</URL>
        <Description>CVE-2017-12998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().</Note>
    </Notes>
    <CVE>CVE-2017-12999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12999.html</URL>
        <Description>CVE-2017-12999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().</Note>
    </Notes>
    <CVE>CVE-2017-13000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13000.html</URL>
        <Description>CVE-2017-13000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().</Note>
    </Notes>
    <CVE>CVE-2017-13001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13001.html</URL>
        <Description>CVE-2017-13001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().</Note>
    </Notes>
    <CVE>CVE-2017-13002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13002.html</URL>
        <Description>CVE-2017-13002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13003.html</URL>
        <Description>CVE-2017-13003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().</Note>
    </Notes>
    <CVE>CVE-2017-13004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13004.html</URL>
        <Description>CVE-2017-13004</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().</Note>
    </Notes>
    <CVE>CVE-2017-13005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13005.html</URL>
        <Description>CVE-2017-13005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The L2TP parser in tcpdump before 4.9.2 has a buffer over-read in print-l2tp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13006.html</URL>
        <Description>CVE-2017-13006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().</Note>
    </Notes>
    <CVE>CVE-2017-13007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13007.html</URL>
        <Description>CVE-2017-13007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().</Note>
    </Notes>
    <CVE>CVE-2017-13008</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13008.html</URL>
        <Description>CVE-2017-13008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print().</Note>
    </Notes>
    <CVE>CVE-2017-13009</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13009.html</URL>
        <Description>CVE-2017-13009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().</Note>
    </Notes>
    <CVE>CVE-2017-13010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13010.html</URL>
        <Description>CVE-2017-13010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().</Note>
    </Notes>
    <CVE>CVE-2017-13011</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13011.html</URL>
        <Description>CVE-2017-13011</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123142</URL>
        <Description>SUSE Bug 1123142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13012.html</URL>
        <Description>CVE-2017-13012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ARP parser in tcpdump before 4.9.2 has a buffer over-read in print-arp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13013.html</URL>
        <Description>CVE-2017-13013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13014.html</URL>
        <Description>CVE-2017-13014</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().</Note>
    </Notes>
    <CVE>CVE-2017-13015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13015.html</URL>
        <Description>CVE-2017-13015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().</Note>
    </Notes>
    <CVE>CVE-2017-13016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13016.html</URL>
        <Description>CVE-2017-13016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13017.html</URL>
        <Description>CVE-2017-13017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13018.html</URL>
        <Description>CVE-2017-13018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13019.html</URL>
        <Description>CVE-2017-13019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13020.html</URL>
        <Description>CVE-2017-13020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13021.html</URL>
        <Description>CVE-2017-13021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().</Note>
    </Notes>
    <CVE>CVE-2017-13022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13022.html</URL>
        <Description>CVE-2017-13022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13023</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13023.html</URL>
        <Description>CVE-2017-13023</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13024.html</URL>
        <Description>CVE-2017-13024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().</Note>
    </Notes>
    <CVE>CVE-2017-13025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13025.html</URL>
        <Description>CVE-2017-13025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13026</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13026.html</URL>
        <Description>CVE-2017-13026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().</Note>
    </Notes>
    <CVE>CVE-2017-13027</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13027.html</URL>
        <Description>CVE-2017-13027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13028.html</URL>
        <Description>CVE-2017-13028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:print_ccp_config_options().</Note>
    </Notes>
    <CVE>CVE-2017-13029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13029.html</URL>
        <Description>CVE-2017-13029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PIM parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13030.html</URL>
        <Description>CVE-2017-13030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13031.html</URL>
        <Description>CVE-2017-13031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RADIUS parser in tcpdump before 4.9.2 has a buffer over-read in print-radius.c:print_attr_string().</Note>
    </Notes>
    <CVE>CVE-2017-13032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13032.html</URL>
        <Description>CVE-2017-13032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13033</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13033.html</URL>
        <Description>CVE-2017-13033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13034</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13034.html</URL>
        <Description>CVE-2017-13034</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id().</Note>
    </Notes>
    <CVE>CVE-2017-13035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13035.html</URL>
        <Description>CVE-2017-13035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3().</Note>
    </Notes>
    <CVE>CVE-2017-13036</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13036.html</URL>
        <Description>CVE-2017-13036</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().</Note>
    </Notes>
    <CVE>CVE-2017-13037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13037.html</URL>
        <Description>CVE-2017-13037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp().</Note>
    </Notes>
    <CVE>CVE-2017-13038</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13038.html</URL>
        <Description>CVE-2017-13038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13039</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13039.html</URL>
        <Description>CVE-2017-13039</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13040</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13040.html</URL>
        <Description>CVE-2017-13040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print().</Note>
    </Notes>
    <CVE>CVE-2017-13041</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13041.html</URL>
        <Description>CVE-2017-13041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13042.html</URL>
        <Description>CVE-2017-13042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn().</Note>
    </Notes>
    <CVE>CVE-2017-13043</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13043.html</URL>
        <Description>CVE-2017-13043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print().</Note>
    </Notes>
    <CVE>CVE-2017-13044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13044.html</URL>
        <Description>CVE-2017-13044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().</Note>
    </Notes>
    <CVE>CVE-2017-13045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13045.html</URL>
        <Description>CVE-2017-13045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().</Note>
    </Notes>
    <CVE>CVE-2017-13046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13046.html</URL>
        <Description>CVE-2017-13046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().</Note>
    </Notes>
    <CVE>CVE-2017-13047</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13047.html</URL>
        <Description>CVE-2017-13047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().</Note>
    </Notes>
    <CVE>CVE-2017-13048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13048.html</URL>
        <Description>CVE-2017-13048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print().</Note>
    </Notes>
    <CVE>CVE-2017-13049</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13049.html</URL>
        <Description>CVE-2017-13049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print().</Note>
    </Notes>
    <CVE>CVE-2017-13050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13050.html</URL>
        <Description>CVE-2017-13050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().</Note>
    </Notes>
    <CVE>CVE-2017-13051</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13051.html</URL>
        <Description>CVE-2017-13051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print().</Note>
    </Notes>
    <CVE>CVE-2017-13052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13052.html</URL>
        <Description>CVE-2017-13052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().</Note>
    </Notes>
    <CVE>CVE-2017-13053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13053.html</URL>
        <Description>CVE-2017-13053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print().</Note>
    </Notes>
    <CVE>CVE-2017-13054</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13054.html</URL>
        <Description>CVE-2017-13054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv().</Note>
    </Notes>
    <CVE>CVE-2017-13055</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13055.html</URL>
        <Description>CVE-2017-13055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().</Note>
    </Notes>
    <CVE>CVE-2017-13687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13687.html</URL>
        <Description>CVE-2017-13687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print().</Note>
    </Notes>
    <CVE>CVE-2017-13688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13688.html</URL>
        <Description>CVE-2017-13688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().</Note>
    </Notes>
    <CVE>CVE-2017-13689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13689.html</URL>
        <Description>CVE-2017-13689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.</Note>
    </Notes>
    <CVE>CVE-2017-13690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13690.html</URL>
        <Description>CVE-2017-13690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().</Note>
    </Notes>
    <CVE>CVE-2017-13725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:tcpdump-4.9.2-9.1</ProductID>
        <ProductID>openSUSE Leap 42.3:tcpdump-4.9.2-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13725.html</URL>
        <Description>CVE-2017-13725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050219</URL>
        <Description>SUSE Bug 1050219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050222</URL>
        <Description>SUSE Bug 1050222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1050225</URL>
        <Description>SUSE Bug 1050225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057247</URL>
        <Description>SUSE Bug 1057247</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
