CVE-2003-0093
https://notcve.org/view.php?id=CVE-2003-0093
The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop. • http://www.debian.org/security/2003/dsa-261 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027 http://www.redhat.com/support/errata/RHSA-2003-032.html http://www.redhat.com/support/errata/RHSA-2003-033.html http://www.redhat.com/support/errata/RHSA-2003-214.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=81585 https://exchange.xforce.ibmcloud.com/vulnerabilities/11324 https://access.redhat.com/security/cve/CVE-2003-0093 https://bugzilla.redhat.com •
CVE-2002-1350
https://notcve.org/view.php?id=CVE-2002-1350
The BGP decoding routines in tcpdump 3.6.x before 3.7 do not properly copy data, which allows remote attackers to cause a denial of service (application crash). • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-050.0.txt http://marc.info/?l=bugtraq&m=104032975103398&w=2 http://www.debian.org/security/2002/dsa-206 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027 http://www.redhat.com/support/errata/RHSA-2003-032.html http://www.redhat.com/support/errata/RHSA-2003-033.html http://www.redhat.com/support/errata/RHSA-2003-214.html http://www.securityfocus.com/bid/6213 http://www.tcpdump.org/lists/w •
CVE-2002-0380
https://notcve.org/view.php?id=CVE-2002-0380
Buffer overflow in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via an NFS packet. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-025.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000491 http://marc.info/?l=bugtraq&m=102339541014226&w=2 http://marc.info/?l=bugtraq&m=102650721503642&w=2 http://online.securityfocus.com/advisories/4169 http://www.debian.org/security/2003/dsa-255 http://www.iss.net/security_center/static/9216.php http://www.redhat.com/support/errata/RHSA-2002-094.html http://www.redhat.com/support/errata •
CVE-1999-1024 – tcpdump 3.4 - Protocol Four / Zero Header Length
https://notcve.org/view.php?id=CVE-1999-1024
ip_print procedure in Tcpdump 3.4a allows remote attackers to cause a denial of service via a packet with a zero length header, which causes an infinite loop and core dump when tcpdump prints the packet. • https://www.exploit-db.com/exploits/19251 http://marc.info/?l=bugtraq&m=92955903802773&w=2 http://marc.info/?l=bugtraq&m=92963447601748&w=2 http://marc.info/?l=bugtraq&m=92989907627051&w=2 http://www.securityfocus.com/bid/313 •
CVE-2001-1279
https://notcve.org/view.php?id=CVE-2001-1279
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-025.0.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:48.tcpdump.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000480 http://www.iss.net/security_center/static/7006.php http://www.kb.cert.org/vuls/id/797201 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-032.php http://www.redhat.com/support/errata/RHSA-2001-089.html http://www.securityfocus.com/bid/3065 •