Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lbl tcpdump 3.6.2 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2003-0093
The RADIUS decoder in tcpdump 3.6.2 and previous versions allows remote malicious users to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
445
VMScore
CVE-2003-0145
Unknown vulnerability in tcpdump prior to 3.7.2 related to an inability to "Handle unknown RADIUS attributes properly," allows remote malicious users to cause a denial of service (infinite loop), a different vulnerability than CAN-2003-0093.
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.7.1
505
VMScore
CVE-2003-0108
isakmp_sub_print in tcpdump 3.6 up to and including 3.7.1 allows remote malicious users to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
Lbl Tcpdump 3.7
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
1 EDB exploit
445
VMScore
CVE-2004-0055
The print_attr_string function in print-radius.c for tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.5.2
505
VMScore
CVE-2003-1029
The L2TP protocol parser in tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (infinite loop and memory consumption) via a packet with invalid data to UDP port 1701, which causes l2tp_avp_print to use a bad length value when calling pr...
Lbl Tcpdump 3.4
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.7
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
1 EDB exploit
668
VMScore
CVE-2001-1279
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote malicious users to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1...
Lbl Tcpdump 3.6.2
505
VMScore
CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.7
Lbl Tcpdump 3.9.1
Lbl Tcpdump 3.5 Alpha
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.8.3
Lbl Tcpdump 3.9
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.8.1
Lbl Tcpdump 3.8.2
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.7.2
Trustix Secure Linux 2.0
Trustix Secure Linux 2.1
Mandrakesoft Mandrake Linux 10.2
Redhat Fedora Core Core 3.0
Redhat Fedora Core Core 4.0
Mandrakesoft Mandrake Linux 10.1
Gentoo Linux
1 EDB exploit
668
VMScore
CVE-2002-0380
Buffer overflow in tcpdump 3.6.2 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an NFS packet.
Lbl Tcpdump
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started