{"vuid":"VU#738518","idnumber":"738518","name":"tcpdump contains vulnerability in ISAKMP decoding routine","keywords":["tcpdump","Internet Security Association and Key Management Protocol","ISAKMP","DoS","arbitrary code execution","denial of service","infinite loop"],"overview":"tcpdump contains a vulnerability in the way it decodes Internet Security Association and Key Management Protocol (ISAKMP) packets.","clean_desc":"tcpdump is a widely-used network sniffer that is capable of decoding ISAKMP packets. A vulnerability exists in the way tcpdump parses specially crafted ISAKMP packets.","impact":"A remote attacker could cause tcpdump to enter an infinite loop or possibly execute arbitrary code with privileges of the tcpdump process.","resolution":"Upgrade or Apply Patch Upgrade or apply a patch as specified by your vendor.","workarounds":"","sysaffected":"","thanks":"This vulnerability was originally reported by Red Hat, Inc. Red Hat, in turn, credits George Bakos for discovering this vulnerability.","author":"This document was written by Damon Morda.","public":["http://www.tcpdump.org/","http://www.ietf.org/rfc/rfc2408.txt","http://www.redhat.com/support/errata/RHSA-2004-007.html","http://www.secunia.com/advisories/10636/","http://xforce.iss.net/xforce/xfdb/14835","http://www.securityfocus.com/bid/9423"],"cveids":["CVE-2003-0989"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-15T18:44:39Z","publicdate":"2004-01-14T00:00:00Z","datefirstpublished":"2004-01-16T21:16:15Z","dateupdated":"2004-01-22T17:57:54Z","revision":30,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"7","cam_attackeraccessrequired":"15","cam_scorecurrent":"2.953125","cam_scorecurrentwidelyknown":"3.69140625","cam_scorecurrentwidelyknownexploited":"6.64453125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.953125,"vulnote":null}