Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcpdump tcpdump vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0989
tcpdump prior to 3.8.1 allows remote malicious users to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057.
Redhat Tcpdump
Redhat Linux 9.0
NA
CVE-2003-1029
The L2TP protocol parser in tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (infinite loop and memory consumption) via a packet with invalid data to UDP port 1701, which causes l2tp_avp_print to use a bad length value when calling pr...
Lbl Tcpdump 3.4
Lbl Tcpdump 3.6.3
Lbl Tcpdump 3.7
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
1 EDB exploit
NA
CVE-2004-0055
The print_attr_string function in print-radius.c for tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.5.2
NA
CVE-2004-0057
The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid "len" or "loc" values...
Lbl Tcpdump
NA
CVE-2003-0670
Sustworks IPNetSentryX and IPNetMonitorX allow local users to sniff network packets via the setuid helper applications (1) RunTCPDump, which calls tcpdump, and (2) RunTCPFlow, which calls tcpflow.
Sustainable Softworks Ipnetsentryx
Sustainable Softworks Ipnetmonitorx
NA
CVE-2003-0194
tcpdump does not properly drop privileges to the pcap user when starting up.
Redhat Tcpdump 3.6.3-3
Redhat Tcpdump 3.7.2-1
Redhat Tcpdump 3.4-39
Redhat Tcpdump 3.6.2-9
Redhat Tcpdump 3.6.2-12
Redhat Linux 7.1
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 8.0
NA
CVE-2003-0145
Unknown vulnerability in tcpdump prior to 3.7.2 related to an inability to "Handle unknown RADIUS attributes properly," allows remote malicious users to cause a denial of service (infinite loop), a different vulnerability than CAN-2003-0093.
Lbl Tcpdump 3.6.2
Lbl Tcpdump 3.7
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.7.1
NA
CVE-2003-0108
isakmp_sub_print in tcpdump 3.6 up to and including 3.7.1 allows remote malicious users to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
Lbl Tcpdump 3.7
Lbl Tcpdump 3.7.1
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
1 EDB exploit
NA
CVE-2003-0093
The RADIUS decoder in tcpdump 3.6.2 and previous versions allows remote malicious users to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
Lbl Tcpdump 3.4
Lbl Tcpdump 3.4a6
Lbl Tcpdump 3.5
Lbl Tcpdump 3.5.2
Lbl Tcpdump 3.6.2
NA
CVE-2002-1350
The BGP decoding routines in tcpdump 3.6.x prior to 3.7 do not properly copy data, which allows remote malicious users to cause a denial of service (application crash).
Lbl Tcpdump
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »