ID CVE-2003-0093
Summary The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
References
Vulnerable Configurations
  • cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*
    cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*
  • cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 10-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2003:032
  • rhsa
    id RHSA-2003:033
  • rhsa
    id RHSA-2003:214
refmap via4
debian DSA-261
mandrake MDKSA-2003:027
misc https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=81585
xf tcpdump-radius-decoder-dos(11324)
Last major update 10-10-2017 - 01:30
Published 03-03-2003 - 05:00
Last modified 10-10-2017 - 01:30
Back to Top