{"vuid":"VU#492558","idnumber":"492558","name":"tcpdump contains integer underflow vulnerability in ISAKMP \"Identification Payload\" handling","keywords":["tcpdump","DoS","denial of service","ISAKMP","Identification","Payload Length","integer underflow"],"overview":"A vulnerability in tcpdump could allow a remote attacker to cause a denial of service on an affected system.","clean_desc":"The tcpdump tool allows for the inspection of network packets and contains decoders for many standard protocols, including the Internet Security Association and Key Management Protocol (ISAKMP). The ISAKMP \"Identification Payload\" contains information used for determining the identities of communicating peers and may be used for determining authenticity of information. A flaw exists in the way that tcpdump's ISAKMP decoder handles ISAKMP packets with a malformed Identification Payload. According to the Rapid7 advisory about this issue: An ISAKMP packet with a malformed Identification payload with a self-reported payload length that becomes less than 8 when its byte order is reversed will cause TCPDUMP to crash as it tries to read from beyond the end of the snap buffer. TCPDUMP must be using a snaplen of 325 or greater for this underflow to be triggered. This condition is only exploitable if tcpdump is invoked with the verbose display option, '-v'.","impact":"A remote attacker could cause tcpdump to crash.","resolution":"Apply a patch from the vendor Patches have been released to address this issue. Please see the Systems Affected section of this document for more details.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by \nRapid7\n using their Striker test suite.","author":"This document was written by Chad R Dougherty based on information published in Rapid7 Advisory R7-0017.","public":["http://www.rapid7.com/advisories/R7-0017.html","http://secunia.com/advisories/11258/","http://www.securitytracker.com/alerts/2004/Mar/1009593.html"],"cveids":["CVE-2004-0184"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-31T20:22:54Z","publicdate":"2004-03-30T00:00:00Z","datefirstpublished":"2004-08-27T13:26:07Z","dateupdated":"2004-08-27T13:26:11Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"1.6875","cam_scorecurrentwidelyknown":"2.109375","cam_scorecurrentwidelyknownexploited":"3.796875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.6875,"vulnote":null}