The RADIUS decoder in tcpdump 3.6.2 and previous versions allows remote malicious users to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
lbl tcpdump 3.4 |
||
lbl tcpdump 3.4a6 |
||
lbl tcpdump 3.5 |
||
lbl tcpdump 3.5.2 |
||
lbl tcpdump 3.6.2 |