First published: Tue Apr 06 2004(Updated: )
Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
tcpdump | <=3.8.1 | |
tcpdump tcpdump | <=3.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0184 is classified as a denial of service vulnerability.
The best way to fix CVE-2004-0184 is to upgrade to a version of TCPDUMP later than 3.8.1.
CVE-2004-0184 affects TCPDUMP versions 3.8.1 and earlier.
CVE-2004-0184 enables remote attackers to cause a denial of service by sending a crafted ISAKMP packet.
The cause of CVE-2004-0184 is an integer underflow during byte order conversion in the isakmp_id_print function.