Page 36 of 184 results (0.025 seconds)

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

Unknown vulnerability in tcpdump before 3.7.2 related to an inability to "Handle unknown RADIUS attributes properly," allows remote attackers to cause a denial of service (infinite loop), a different vulnerability than CAN-2003-0093. • http://www.debian.org/security/2003/dsa-261 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027 http://www.redhat.com/support/errata/RHSA-2003-032.html http://www.redhat.com/support/errata/RHSA-2003-151.html http://www.redhat.com/support/errata/RHSA-2003-214.html http://www.tcpdump.org/tcpdump-changes.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/11857 https://access.redhat.com/security/cve/CVE-2003-0145 https://bugzilla.redhat.com/show_bug.cgi?i •

CVSS: 5.0EPSS: 3%CPEs: 4EXPL: 1

isakmp_sub_print in tcpdump 3.6 through 3.7.1 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop. isakmp_sub_print en tcpdump 3.6 a la 3.7.1 permite a atacantes remotos causar Denegación de Servicio (consumo de CPU) mediante cierto paquete ISAKMP malformado enviado al puerto 500 UDP, lo que provoca que tcpdump entre en un bucle infinito. • https://www.exploit-db.com/exploits/22294 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000629 http://marc.info/?l=bugtraq&m=104637420104189&w=2 http://marc.info/?l=bugtraq&m=104678787109030&w=2 http://www.debian.org/security/2003/dsa-255 http://www.idefense.com/advisory/02.27.03.txt http://www.iss.net/security_center/static/11434.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027 http://www.novell.com/linux/security/advisories/2 •

CVSS: 5.0EPSS: 2%CPEs: 5EXPL: 1

The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop. • http://www.debian.org/security/2003/dsa-261 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027 http://www.redhat.com/support/errata/RHSA-2003-032.html http://www.redhat.com/support/errata/RHSA-2003-033.html http://www.redhat.com/support/errata/RHSA-2003-214.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=81585 https://exchange.xforce.ibmcloud.com/vulnerabilities/11324 https://access.redhat.com/security/cve/CVE-2003-0093 https://bugzilla.redhat.com&#x •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

The BGP decoding routines in tcpdump 3.6.x before 3.7 do not properly copy data, which allows remote attackers to cause a denial of service (application crash). • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-050.0.txt http://marc.info/?l=bugtraq&m=104032975103398&w=2 http://www.debian.org/security/2002/dsa-206 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027 http://www.redhat.com/support/errata/RHSA-2003-032.html http://www.redhat.com/support/errata/RHSA-2003-033.html http://www.redhat.com/support/errata/RHSA-2003-214.html http://www.securityfocus.com/bid/6213 http://www.tcpdump.org/lists/w •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

Buffer overflow in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via an NFS packet. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-025.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000491 http://marc.info/?l=bugtraq&m=102339541014226&w=2 http://marc.info/?l=bugtraq&m=102650721503642&w=2 http://online.securityfocus.com/advisories/4169 http://www.debian.org/security/2003/dsa-255 http://www.iss.net/security_center/static/9216.php http://www.redhat.com/support/errata/RHSA-2002-094.html http://www.redhat.com/support/errata •