Vulnerability Note VU#955526

tcpdump contains vulnerability in RADIUS decoding function print_attr_string() in print-radius.c

Original Release date: 16 Jan 2004 | Last revised: 19 Mar 2004

Overview

tcpdump contains a vulnerability in the way it parses Remote Authentication Dial In User Service (RADIUS) packets.

Description

tcpdump is a widely used network sniffer that is capable of decoding RADIUS packets. A vulnerability exists in the way the tcpdump print_attr_string() function (in print-radius.c) parses RADIUS attributes containing overly long length values. For more information, please see RHSA-2004-007.

Impact

A remote attacker could cause a denial of service or possibly execute arbitrary code with privileges of the tcpdump process.

Solution

Upgrade or Apply Patch

Upgrade or apply a patch as specified by your vendor.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
DebianAffected16 Jan 200421 Jan 2004
Guardian Digital Inc. Affected16 Jan 200421 Jan 2004
OpenPKGAffected-21 Jan 2004
Red Hat Inc.Affected16 Jan 200421 Jan 2004
SuSE Inc.Affected16 Jan 200421 Jan 2004
tcpdump.orgAffected-21 Jan 2004
TrusixAffected-21 Jan 2004
TurboLinuxAffected16 Jan 200422 Jan 2004
HitachiNot Affected16 Jan 200422 Jan 2004
Openwall GNU/*/LinuxNot Affected16 Jan 200421 Jan 2004
Apple Computer Inc.Unknown-21 Jan 2004
ConectivaUnknown16 Jan 200421 Jan 2004
Cray Inc.Unknown-21 Jan 2004
EMC CorporationUnknown16 Jan 200421 Jan 2004
FreeBSDUnknown16 Jan 200421 Jan 2004
If you are a vendor and your product is affected, let us know.View More »

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was originally reported by Red Hat, Inc. Red Hat, in turn, credits Jonathan Heusser for discovering this vulnerability.

This document was written by Damon Morda.

Other Information

  • CVE IDs: CAN-2004-0055
  • Date Public: 14 Jan 2004
  • Date First Published: 16 Jan 2004
  • Date Last Updated: 19 Mar 2004
  • Severity Metric: 2.95
  • Document Revision: 17

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.