Vulnerability Name: | CVE-2004-0057 (CCN-14837) | ||||||||||||||||||||||||||||
Assigned: | 2004-01-04 | ||||||||||||||||||||||||||||
Published: | 2004-01-04 | ||||||||||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||||||||||
Summary: | The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values to be used in a loop, a different vulnerability than CVE-2003-0989. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: CALDERA Type: UNKNOWN CSSA-2004-008.0 Source: SCO Type: UNKNOWN SCOSA-2004.9 Source: SGI Type: UNKNOWN 20040103-01-U Source: SGI Type: UNKNOWN 20040202-01-U Source: MITRE Type: CNA CVE-2004-0057 Source: APPLE Type: UNKNOWN APPLE-SA-2004-02-23 Source: TRUSTIX Type: UNKNOWN 2004-0004 Source: ENGARDE Type: UNKNOWN ESA-20040119-002 Source: BUGTRAQ Type: UNKNOWN 20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) Source: MLIST Type: UNKNOWN [tcpdump-workers] multiple vulnerabilities in tcpdump 3.8.1 Source: CCN Type: tcpdump-workers Mailing List, 2004-01-04 21:23:42 multiple vulnerabilities in tcpdump 3.8.1 Source: CCN Type: RHSA-2004-007 Updated tcpdump packages fix various vulnerabilities Source: CCN Type: RHSA-2004-008 tcpdump security update Source: CCN Type: SA10636 tcpdump ISAKMP and RADIUS Packet Handling Vulnerabilities Source: SECUNIA Type: UNKNOWN 10636 Source: SECUNIA Type: UNKNOWN 10639 Source: SECUNIA Type: UNKNOWN 10644 Source: SECUNIA Type: UNKNOWN 10652 Source: SECUNIA Type: UNKNOWN 10668 Source: SECUNIA Type: UNKNOWN 10718 Source: SECUNIA Type: UNKNOWN 11022 Source: SECUNIA Type: UNKNOWN 11032 Source: SECUNIA Type: UNKNOWN 12179 Source: CCN Type: SECTRACK ID: 1008716 Tcpdump Can Be Crashed By a Remote User Sending a Malicious ISAKMP Packet Source: CCN Type: CIAC Information Bulletin O-061 Red Hat Updated tcpdump Packages Fix Various Vulnerabilities Source: DEBIAN Type: Patch, Vendor Advisory DSA-425 Source: DEBIAN Type: DSA-425 tcpdump -- multiple vulnerabilities Source: CCN Type: US-CERT VU#174086 tcpdump contains vulnerability in ISAKMP decoding function rawprint() in print-isakmp.c Source: CERT-VN Type: US Government Resource VU#174086 Source: CCN Type: Guardian Digital Security Advisory ESA-20040119-002 libpcap, tcpdump Source: CCN Type: SCO Security Advisory CSSA-2004-008.0 OpenLinux: Tcpdump flaws in ISAKMP Source: CCN Type: SCO Security Advisory SCOSA-2004.9 UnixWare 7.1.3up : tcpdump several vulnerabilities in tcpdump Source: MANDRAKE Type: UNKNOWN MDKSA-2004:008 Source: CCN Type: OpenPKG-SA-2004.002 tcpdump Source: FEDORA Type: UNKNOWN FEDORA-2004-090 Source: FEDORA Type: UNKNOWN FEDORA-2004-092 Source: MLIST Type: UNKNOWN [fedora-announce-list] 20040311 Re: [SECURITY] Fedora Core 1 Update: tcpdump-3.7.2-8.fc1.1 Source: FEDORA Type: UNKNOWN FLSA:1222 Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:007 Source: REDHAT Type: UNKNOWN RHSA-2004:008 Source: BUGTRAQ Type: UNKNOWN 20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities. Source: BID Type: Patch, Vendor Advisory 9423 Source: CCN Type: BID-9423 TCPDump ISAKMP Decoding Routines Multiple Remote Buffer Overflow Vulnerabilities Source: SECTRACK Type: UNKNOWN 1008716 Source: CCN Type: TLSA-2004-3 Multiple vulnerabilities in tcpdump Source: XF Type: UNKNOWN tcpdump-rawprint-isakmp-dos(14837) Source: XF Type: UNKNOWN tcpdump-rawprint-isakmp-dos(14837) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11197 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:851 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:854 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |