Overview
There is a denial-of-service vulnerability in tcpdump that may allow a remote attacker to cause tcpdump to enter an infinite loop.
Description
| tcpdump, a tool used to monitor network traffic, has the ability to capture Internet Security Association and Key Management Protocol (ISAKMP) packets. A vulnerability exists in the way in which tcpdump parses ISAKMP packets. For further technical details, please see iDEFENSE Security Advisory 02.27.03. | 
Impact
| A remote attacker may be able to cause tcpdump to enter an infinite loop, which will require a manual restart of tcpdump. | 
Solution
| Apply a vendor-supplied patch. If a patch is not available from your vendor, you should upgrade to the latest version of tcpdump. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was discovered by Andrew Griffiths (andrewg@d2.net.au).
This document was written by Ian A Finlay.
Other Information
| CVE IDs: | CVE-2003-0108 | 
| Severity Metric: | 4.50 | 
| Date Public: | 2003-02-27 | 
| Date First Published: | 2003-04-28 | 
| Date Last Updated: | 2003-04-28 16:43 UTC | 
| Document Revision: | 12 |