isakmp_sub_print in tcpdump 3.6 through 3.7.1 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tcpdump | Lbl | 3.5.2 (including) | 3.5.2 (including) |
Tcpdump | Lbl | 3.6.2 (including) | 3.6.2 (including) |
Tcpdump | Lbl | 3.7 (including) | 3.7 (including) |
Tcpdump | Lbl | 3.7.1 (including) | 3.7.1 (including) |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.2 | RedHat | * | |
Red Hat Linux 7.3 | RedHat | * | |
Red Hat Linux 8.0 | RedHat | * | |
Red Hat Linux Advanced Workstation 2.1 | RedHat | * | |
Tcpdump | Ubuntu | dapper | * |
Tcpdump | Ubuntu | devel | * |
Tcpdump | Ubuntu | edgy | * |
Tcpdump | Ubuntu | feisty | * |