Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Tcpdump
(Lbl)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 16 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2003-03-03 | CVE-2003-0093 | The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop. | Tcpdump | N/A | ||
2002-12-23 | CVE-2002-1350 | The BGP decoding routines in tcpdump 3.6.x before 3.7 do not properly copy data, which allows remote attackers to cause a denial of service (application crash). | Tcpdump | N/A | ||
2002-06-18 | CVE-2002-0380 | Buffer overflow in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via an NFS packet. | Tcpdump | N/A | ||
2001-07-17 | CVE-2001-1279 | Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026. | Tcpdump | N/A | ||
2000-12-11 | CVE-2000-1026 | Multiple buffer overflows in LBNL tcpdump allow remote attackers to execute arbitrary commands. | Tcpdump | N/A | ||
2001-11-28 | CVE-1999-1024 | ip_print procedure in Tcpdump 3.4a allows remote attackers to cause a denial of service via a packet with a zero length header, which causes an infinite loop and core dump when tcpdump prints the packet. | Tcpdump | N/A |