Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:008: tcpdump

Vulnerability Assessment Details

MDKSA-2004:008: tcpdump

Vulnerability Assessment Summary
Check for the version of the tcpdump package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:008 (tcpdump).

A number of vulnerabilities were discovered in tcpdump versions prior to 3.8.1
that, if fed a maliciously crafted packet, could be exploited to crash tcpdump
or potentially execute arbitrary code with the rights of the user running
tcpdump. These vulnerabilities include:
An infinite loop and memory consumption processing L2TP packets (CVE-2003-1029).
Infinite loops in processing ISAKMP packets (CVE-2003-0989, CVE-2004-0057).
A segmentation fault caused by a RADIUS attribute with a large length value
The updated packages are patched to correct these problem.

Solution :
Network Security Threat Level: High

Networks Security ID: 9263, 9423

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Siemens Efficient Networks Se5940 T1 5940 Gateway
Siemens Efficient Networks Se5940 T1 5940 Gateway pictureCisco Catalyst 3560-E Series Switch, 48 Port, IP Base, WS-C3560E-48TD-S
Cisco Catalyst 3560-E Series Switch, 48 Port, IP Base, WS-C3560E-48TD-S pictureCisco WS-C3850-48F-L New Sealed
Cisco WS-C3850-48F-L  New Sealed pictureJuniper EX3200-24P
Juniper EX3200-24P picture


No Discussions have been posted on this vulnerability.