First published: Fri Mar 07 2003(Updated: )
isakmp_sub_print in tcpdump 3.6 through 3.7.1 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump | =3.7.1 | |
Tcpdump | =3.5.2 | |
Tcpdump | =3.7 | |
Tcpdump | =3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0108 is classified as a moderate severity vulnerability due to its potential for causing denial of service.
To fix CVE-2003-0108, upgrade tcpdump to version 3.7.2 or later, as this version addresses the vulnerability.
CVE-2003-0108 affects tcpdump versions 3.5.2, 3.6.2, 3.7, and 3.7.1.
CVE-2003-0108 can be exploited by sending a malformed ISAKMP packet to UDP port 500.
The consequence of CVE-2003-0108 is that it may lead to increased CPU consumption resulting in a denial of service.