Vulnerability Description
The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lbl | Tcpdump | 3.4 |
References
- http://www.debian.org/security/2003/dsa-261
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027
- http://www.redhat.com/support/errata/RHSA-2003-032.html
- http://www.redhat.com/support/errata/RHSA-2003-033.html
- http://www.redhat.com/support/errata/RHSA-2003-214.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=81585ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11324
- http://www.debian.org/security/2003/dsa-261
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:027
- http://www.redhat.com/support/errata/RHSA-2003-032.html
- http://www.redhat.com/support/errata/RHSA-2003-033.html
- http://www.redhat.com/support/errata/RHSA-2003-214.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=81585ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11324
FAQ
What is CVE-2003-0093?
CVE-2003-0093 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to gener...
How severe is CVE-2003-0093?
CVE-2003-0093 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0093?
Check the references section above for vendor advisories and patch information. Affected products include: Lbl Tcpdump.