search menu icon-carat-right cmu-wordmark

CERT Coordination Center

tcpdump contains vulnerability in RADIUS decoding function print_attr_string() in print-radius.c

Vulnerability Note VU#955526

Original Release Date: 2004-01-16 | Last Revised: 2004-03-19

Overview

tcpdump contains a vulnerability in the way it parses Remote Authentication Dial In User Service (RADIUS) packets.

Description

tcpdump is a widely used network sniffer that is capable of decoding RADIUS packets. A vulnerability exists in the way the tcpdump print_attr_string() function (in print-radius.c) parses RADIUS attributes containing overly long length values. For more information, please see RHSA-2004-007.

Impact

A remote attacker could cause a denial of service or possibly execute arbitrary code with privileges of the tcpdump process.

Solution

Upgrade or Apply Patch

Upgrade or apply a patch as specified by your vendor.

Vendor Information

955526
 

View all 33 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was originally reported by Red Hat, Inc. Red Hat, in turn, credits Jonathan Heusser for discovering this vulnerability.

This document was written by Damon Morda.

Other Information

CVE IDs: CVE-2004-0055
Severity Metric: 2.95
Date Public: 2004-01-14
Date First Published: 2004-01-16
Date Last Updated: 2004-03-19 16:56 UTC
Document Revision: 17

Sponsored by CISA.