First published: Mon May 31 1999(Updated: )
tcpdump, Ethereal, and other sniffer packages allow remote attackers to cause a denial of service via malformed DNS packets in which a jump offset refers to itself, which causes tcpdump to enter an infinite loop while decompressing the packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ethereal | =0.8.4 | |
Ethereal | =0.8.5 | |
Ethereal | =0.8.6 | |
Tcpdump | =3.4 | |
Tcpdump | =3.5a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0333 is considered a moderate severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2000-0333, upgrade to the latest versions of tcpdump or Ethereal that contain patches for this vulnerability.
CVE-2000-0333 affects tcpdump versions 3.4 and 3.5a, as well as Ethereal versions 0.8.4, 0.8.5, and 0.8.6.
CVE-2000-0333 enables a denial of service attack through malformed DNS packets that can cause affected software to enter an infinite loop.
Yes, CVE-2000-0333 can be exploited remotely by attackers who send crafted DNS packets to the vulnerable software.