{"vuid":"VU#677337","idnumber":"677337","name":"tcpdump enters infinite loop when parsing crafted ISAKMP packets","keywords":["tcpdump","infinite loop","DoS","denial of service","crafted ISAKMP packet"],"overview":"There is a denial-of-service vulnerability in tcpdump that may allow a remote attacker to cause tcpdump to enter an infinite loop.","clean_desc":"tcpdump, a tool used to monitor network traffic, has the ability to capture Internet Security Association and Key Management Protocol (ISAKMP) packets. A vulnerability exists in the way in which tcpdump parses ISAKMP packets. For further technical details, please see iDEFENSE Security Advisory 02.27.03.","impact":"A remote attacker may be able to cause tcpdump to enter an infinite loop, which will require a manual restart of tcpdump.","resolution":"Apply a vendor-supplied patch. If a patch is not available from your vendor, you should upgrade to the latest version of tcpdump.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Andrew Griffiths (andrewg@d2.net.au).","author":"This document was written by Ian A Finlay.","public":["http://www.networksorcery.com/enp/protocol/isakmp.htm","http://www.iss.net/security_center/static/11434.php","http://www.idefense.com/advisory/02.27.03.txt","http://www.securityfocus.com/bid/6974","http://www.ietf.org/rfc/rfc2408.txt"],"cveids":["CVE-2003-0108"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-02-27T20:44:44Z","publicdate":"2003-02-27T00:00:00Z","datefirstpublished":"2003-04-28T14:03:45Z","dateupdated":"2003-04-28T16:43:33Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"20","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.5","cam_scorecurrentwidelyknown":"5.625","cam_scorecurrentwidelyknownexploited":"10.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.5,"vulnote":null}