Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
http://www.ubuntu.com/usn/usn-492-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:148
http://www.debian.org/security/2007/dsa-1353
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313
http://security.gentoo.org/glsa/glsa-200707-14.xml
http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html