{"vuid":"VU#955526","idnumber":"955526","name":"tcpdump contains vulnerability in RADIUS decoding function print_attr_string() in print-radius.c","keywords":["tcpdump","DoS","denial of service","Remote Authentication Dial In User Service","RADIUS","print_attr_string","print-radius.c","large length value"],"overview":"tcpdump contains a vulnerability in the way it parses Remote Authentication Dial In User Service (RADIUS) packets.","clean_desc":"tcpdump is a widely used network sniffer that is capable of decoding RADIUS packets. A vulnerability exists in the way the tcpdump print_attr_string() function (in print-radius.c) parses RADIUS attributes containing overly long length values. For more information, please see RHSA-2004-007.","impact":"A remote attacker could cause a denial of service or possibly execute arbitrary code with privileges of the tcpdump process.","resolution":"Upgrade or Apply Patch Upgrade or apply a patch as specified by your vendor.","workarounds":"","sysaffected":"","thanks":"This vulnerability was originally reported by Red Hat, Inc. Red Hat, in turn, credits Jonathan Heusser for discovering this vulnerability.","author":"This document was written by Damon Morda.","public":["http://marc.theaimsgroup.com/?l=tcpdump-workers&m=107325073018070&w=2","http://rhn.redhat.com/errata/RHSA-2004-007.html","http://www.secunia.com/advisories/10636/","http://www.freeradius.org/rfc/attributes.html","http://www.tcpdump.org/","http://www.securityfocus.com/bid/7090","http://xforce.iss.net/xforce/xfdb/14836"],"cveids":["CVE-2004-0055"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-01-15T19:32:31Z","publicdate":"2004-01-14T00:00:00Z","datefirstpublished":"2004-01-16T21:17:59Z","dateupdated":"2004-03-19T16:56:17Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"7","cam_attackeraccessrequired":"15","cam_scorecurrent":"2.953125","cam_scorecurrentwidelyknown":"3.69140625","cam_scorecurrentwidelyknownexploited":"6.64453125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.953125,"vulnote":null}