Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcpdump tcpdump vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-0055
The print_attr_string function in print-radius.c for tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.5.2
5
CVSSv2
CVE-2004-0057
The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values...
Lbl Tcpdump
7.5
CVSSv2
CVE-2003-0989
tcpdump prior to 3.8.1 allows remote malicious users to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057.
Redhat Tcpdump
Redhat Linux 9.0
5
CVSSv2
CVE-2003-1029
The L2TP protocol parser in tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (infinite loop and memory consumption) via a packet with invalid data to UDP port 1701, which causes l2tp_avp_print to use a bad length value when calling pr...
Lbl Tcpdump 3.4
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.7
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
1 EDB exploit
2.1
CVSSv2
CVE-2003-0670
Sustworks IPNetSentryX and IPNetMonitorX allow local users to sniff network packets via the setuid helper applications (1) RunTCPDump, which calls tcpdump, and (2) RunTCPFlow, which calls tcpflow.
Sustainable Softworks Ipnetsentryx
Sustainable Softworks Ipnetmonitorx
4.6
CVSSv2
CVE-2003-0194
tcpdump does not properly drop privileges to the pcap user when starting up.
Redhat Tcpdump 3.6.3-3
Redhat Tcpdump 3.7.2-1
Redhat Tcpdump 3.4-39
Redhat Tcpdump 3.6.2-9
Redhat Tcpdump 3.6.2-12
Redhat Linux 7.1
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 8.0
5
CVSSv2
CVE-2003-0145
Unknown vulnerability in tcpdump prior to 3.7.2 related to an inability to "Handle unknown RADIUS attributes properly," allows remote malicious users to cause a denial of service (infinite loop), a different vulnerability than CAN-2003-0093.
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.7.1
5
CVSSv2
CVE-2003-0108
isakmp_sub_print in tcpdump 3.6 up to and including 3.7.1 allows remote malicious users to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
Lbl Tcpdump 3.7
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
1 EDB exploit
5
CVSSv2
CVE-2003-0093
The RADIUS decoder in tcpdump 3.6.2 and previous versions allows remote malicious users to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
7.5
CVSSv2
CVE-2002-1350
The BGP decoding routines in tcpdump 3.6.x prior to 3.7 do not properly copy data, which allows remote malicious users to cause a denial of service (application crash).
Lbl Tcpdump
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »