isakmp_sub_print in tcpdump 3.6 through 3.7.1 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Tcpdump | Lbl | 3.5.2 (including) | 3.5.2 (including) |
| Tcpdump | Lbl | 3.6.2 (including) | 3.6.2 (including) |
| Tcpdump | Lbl | 3.7 (including) | 3.7 (including) |
| Tcpdump | Lbl | 3.7.1 (including) | 3.7.1 (including) |
| Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
| Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
| Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
| Red Hat Linux 7.1 | RedHat | * | |
| Red Hat Linux 7.1 | RedHat | * | |
| Red Hat Linux 7.2 | RedHat | * | |
| Red Hat Linux 7.3 | RedHat | * | |
| Red Hat Linux 8.0 | RedHat | * | |
| Red Hat Linux Advanced Workstation 2.1 | RedHat | * | |
| Tcpdump | Ubuntu | dapper | * |
| Tcpdump | Ubuntu | devel | * |
| Tcpdump | Ubuntu | edgy | * |
| Tcpdump | Ubuntu | feisty | * |