Vulnerability Name: | CVE-2003-0989 (CCN-14835) | ||||||||||||||||||||||||||||
Assigned: | 2004-01-14 | ||||||||||||||||||||||||||||
Published: | 2004-01-14 | ||||||||||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||||||||||
Summary: | tcpdump before 3.8.1 allows remote attackers to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: CALDERA Type: UNKNOWN CSSA-2004-008.0 Source: SCO Type: UNKNOWN SCOSA-2004.9 Source: SGI Type: UNKNOWN 20040103-01-U Source: SGI Type: UNKNOWN 20040202-01-U Source: MITRE Type: CNA CVE-2003-0989 Source: APPLE Type: UNKNOWN APPLE-SA-2004-02-23 Source: TRUSTIX Type: UNKNOWN 2004-0004 Source: ENGARDE Type: UNKNOWN ESA-20040119-002 Source: BUGTRAQ Type: UNKNOWN 20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) Source: CCN Type: RHSA-2004-007 Updated tcpdump packages fix various vulnerabilities Source: CCN Type: RHSA-2004-008 tcpdump security update Source: CCN Type: SA10636 tcpdump ISAKMP and RADIUS Packet Handling Vulnerabilities Source: SECUNIA Type: UNKNOWN 10636 Source: SECUNIA Type: UNKNOWN 10637 Source: SECUNIA Type: UNKNOWN 10639 Source: SECUNIA Type: UNKNOWN 10644 Source: SECUNIA Type: UNKNOWN 10652 Source: SECUNIA Type: UNKNOWN 10668 Source: SECUNIA Type: UNKNOWN 10718 Source: SECUNIA Type: UNKNOWN 11022 Source: SECUNIA Type: UNKNOWN 11032 Source: SECUNIA Type: UNKNOWN 12179 Source: CCN Type: SECTRACK ID: 1008716 Tcpdump Can Be Crashed By a Remote User Sending a Malicious ISAKMP Packet Source: CCN Type: CIAC Information Bulletin O-061 Red Hat Updated tcpdump Packages Fix Various Vulnerabilities Source: DEBIAN Type: Patch, Vendor Advisory DSA-425 Source: DEBIAN Type: DSA-425 tcpdump -- multiple vulnerabilities Source: CCN Type: GLSA-200404-03 Tcpdump Vulnerabilities in ISAKMP Parsing Source: CCN Type: US-CERT VU#738518 tcpdump contains vulnerability in ISAKMP decoding routine Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#738518 Source: CCN Type: Guardian Digital Security Advisory ESA-20040119-002 libpcap, tcpdump Source: CCN Type: SCO Security Advisory CSSA-2004-008.0 OpenLinux: Tcpdump flaws in ISAKMP Source: CCN Type: GLSA 200404-03 Tcpdump Vulnerabilities in ISAKMP Parsing Source: MANDRAKE Type: UNKNOWN MDKSA-2004:008 Source: CCN Type: OpenPKG-SA-2004.002 tcpdump Source: FEDORA Type: UNKNOWN FEDORA-2004-090 Source: FEDORA Type: UNKNOWN FEDORA-2004-092 Source: MLIST Type: UNKNOWN [fedora-announce-list] 20040311 Re: [SECURITY] Fedora Core 1 Update: tcpdump-3.7.2-8.fc1.1 Source: FEDORA Type: UNKNOWN FLSA:1222 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:007 Source: REDHAT Type: UNKNOWN RHSA-2004:008 Source: BUGTRAQ Type: UNKNOWN 20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities. Source: CCN Type: BID-9423 TCPDump ISAKMP Decoding Routines Multiple Remote Buffer Overflow Vulnerabilities Source: BID Type: UNKNOWN 9507 Source: CCN Type: BID-9507 TCPDump ISAKMP Decoding Routines Denial Of Service Vulnerability Source: SECTRACK Type: UNKNOWN 1008716 Source: CCN Type: TLSA-2004-3 Multiple vulnerabilities in tcpdump Source: XF Type: UNKNOWN tcpdump-isakmp-packet-dos(14835) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10599 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:847 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:852 Source: SUSE Type: SUSE-SA:2004:002 tcpdump: remote DoS | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |