FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  369686
Date:      2014-10-01
Time:      03:40:03Z
Committer: bdrewery

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f8551668-de09-4d7b-9720-f1360929df07tcpdump ISAKMP payload handling remote denial-of-service

Chad Loder has discovered vulnerabilities in tcpdump's ISAKMP protocol handler. During an audit to repair these issues, Bill Fenner discovered some related problems.

These vulnerabilities may be used by an attacker to crash a running `tcpdump' process. They can only be triggered if the `-v' command line option is being used.

NOTE: the racoon ISAKMP/IKE daemon incorporates the ISAKMP protocol handler from tcpdump, and so is also affected by this issue.


Discovery 2004-03-12
Entry 2004-03-31
Modified 2004-04-14
tcpdump
lt 3.8.3

racoon
lt 20040408a

http://marc.theaimsgroup.com/?l=bugtraq&m=108067265931525
http://www.rapid7.com/advisories/R7-0017.html
CVE-2004-0183
CVE-2004-0184
2dc764fa-40c0-11dc-aeac-02e0185f8d72FreeBSD -- Buffer overflow in tcpdump(1)

Problem Description:

An un-checked return value in the BGP dissector code can result in an integer overflow. This value is used in subsequent buffer management operations, resulting in a stack based buffer overflow under certain circumstances.

Impact:

By crafting malicious BGP packets, an attacker could exploit this vulnerability to execute code or crash the tcpdump process on the target system. This code would be executed in the context of the user running tcpdump(1). It should be noted that tcpdump(1) requires privileges in order to open live network interfaces.

Workaround:

No workaround is available.


Discovery 2007-08-01
Entry 2007-08-02
tcpdump
lt 3.9.6

CVE-2007-3798
SA-07:06.tcpdump
9fae0f1f-df82-11d9-b875-0001020eed82tcpdump -- infinite loops in protocol decoding

Problem Description

Several tcpdump protocol decoders contain programming errors which can cause them to go into infinite loops.

Impact

An attacker can inject specially crafted packets into the network which, when processed by tcpdump, could lead to a denial-of-service. After the attack, tcpdump would no longer capture traffic, and would potentially use all available processor time.


Discovery 2005-06-09
Entry 2005-06-18
Modified 2005-06-20
tcpdump
lt 3.8.3_2

CVE-2005-1267
CVE-2005-1278
CVE-2005-1279
CVE-2005-1280
SA-05:10.tcpdump
http://marc.theaimsgroup.com/?l=bugtraq&m=111454406222040
http://marc.theaimsgroup.com/?l=bugtraq&m=111454461300644
http://marc.theaimsgroup.com/?l=bugtraq&m=111928309502304
9fae0f1f-df82-11d9-b875-0001020eed82tcpdump -- infinite loops in protocol decoding

Problem Description

Several tcpdump protocol decoders contain programming errors which can cause them to go into infinite loops.

Impact

An attacker can inject specially crafted packets into the network which, when processed by tcpdump, could lead to a denial-of-service. After the attack, tcpdump would no longer capture traffic, and would potentially use all available processor time.


Discovery 2005-06-09
Entry 2005-06-18
Modified 2005-06-20
tcpdump
lt 3.8.3_2

CVE-2005-1267
CVE-2005-1278
CVE-2005-1279
CVE-2005-1280
SA-05:10.tcpdump
http://marc.theaimsgroup.com/?l=bugtraq&m=111454406222040
http://marc.theaimsgroup.com/?l=bugtraq&m=111454461300644
http://marc.theaimsgroup.com/?l=bugtraq&m=111928309502304
2dc764fa-40c0-11dc-aeac-02e0185f8d72FreeBSD -- Buffer overflow in tcpdump(1)

Problem Description:

An un-checked return value in the BGP dissector code can result in an integer overflow. This value is used in subsequent buffer management operations, resulting in a stack based buffer overflow under certain circumstances.

Impact:

By crafting malicious BGP packets, an attacker could exploit this vulnerability to execute code or crash the tcpdump process on the target system. This code would be executed in the context of the user running tcpdump(1). It should be noted that tcpdump(1) requires privileges in order to open live network interfaces.

Workaround:

No workaround is available.


Discovery 2007-08-01
Entry 2007-08-02
tcpdump
lt 3.9.6

CVE-2007-3798
SA-07:06.tcpdump
f8551668-de09-4d7b-9720-f1360929df07tcpdump ISAKMP payload handling remote denial-of-service

Chad Loder has discovered vulnerabilities in tcpdump's ISAKMP protocol handler. During an audit to repair these issues, Bill Fenner discovered some related problems.

These vulnerabilities may be used by an attacker to crash a running `tcpdump' process. They can only be triggered if the `-v' command line option is being used.

NOTE: the racoon ISAKMP/IKE daemon incorporates the ISAKMP protocol handler from tcpdump, and so is also affected by this issue.


Discovery 2004-03-12
Entry 2004-03-31
Modified 2004-04-14
tcpdump
lt 3.8.3

racoon
lt 20040408a

http://marc.theaimsgroup.com/?l=bugtraq&m=108067265931525
http://www.rapid7.com/advisories/R7-0017.html
CVE-2004-0183
CVE-2004-0184