Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IKE:DOS:TCP-HUMP

Severity

High

Recommended

No

Category

IKE

Keywords

ike tcphump

Release Date

2004/02/02

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IKE: TCP Hump


This protocol anomaly is a malformed packet designed to exploit a vulnerability in the ISAKMP parsing routines of the tcpdump program. Attackers can send maliciously crafted packets on the network to remotely execute arbitrary code with the privileges of the tcpdump process, causing a denial of service (DoS).

Extended Description

It has been reported that tcpdump may be prone to multiple remote buffer overflow vulnerabilities that may allow an attacker to gain unauthorized access to a system. It has been reported that a remote attacker may be able to cause a buffer overrun condition by sending specially crafted packets to a vulnerable system. Immediate consequences of a successful attack may cause a denial of service condition in the software. The attacker may also be able to execute arbitrary code on a vulnerable system as the 'pcap' user. Some of the issues are reported to affect tcpdump versions prior to 3.8.1 and others reportedly affect all versions up to and including tcpdump 3.8.1. This vulnerability record will be divided into multiple Bugtraq IDs when analysis of the individual issues is complete.

Affected Products

  • Apple Mac OS X 10.1.0
  • Apple Mac OS X 10.1.1
  • Apple Mac OS X 10.1.2
  • Apple Mac OS X 10.1.3
  • Apple Mac OS X 10.1.4
  • Apple Mac OS X 10.1.5
  • Apple Mac OS X 10.2.0
  • Apple Mac OS X 10.2.1
  • Apple Mac OS X 10.2.2
  • Apple Mac OS X 10.2.3
  • Apple Mac OS X 10.2.4
  • Apple Mac OS X 10.2.5
  • Apple Mac OS X 10.2.6
  • Apple Mac OS X 10.2.7
  • Apple Mac OS X 10.2.8
  • Apple Mac OS X 10.3.0
  • Apple Mac OS X 10.3.1
  • Apple Mac OS X 10.3.2
  • Apple Mac OS X Server 10.1.0
  • Apple Mac OS X Server 10.1.1
  • Apple Mac OS X Server 10.1.2
  • Apple Mac OS X Server 10.1.3
  • Apple Mac OS X Server 10.1.4
  • Apple Mac OS X Server 10.1.5
  • Apple Mac OS X Server 10.2.0
  • Apple Mac OS X Server 10.2.1
  • Apple Mac OS X Server 10.2.2
  • Apple Mac OS X Server 10.2.3
  • Apple Mac OS X Server 10.2.4
  • Apple Mac OS X Server 10.2.5
  • Apple Mac OS X Server 10.2.6
  • Apple Mac OS X Server 10.2.7
  • Apple Mac OS X Server 10.2.8
  • Apple Mac OS X Server 10.3.0
  • Apple Mac OS X Server 10.3.1
  • Apple Mac OS X Server 10.3.2
  • LBL tcpdump 3.4.0
  • LBL tcpdump 3.4.0 a6
  • LBL tcpdump 3.5.0
  • LBL tcpdump 3.5.0 alpha
  • LBL tcpdump 3.5.2
  • LBL tcpdump 3.6.2
  • LBL tcpdump 3.6.3
  • LBL tcpdump 3.7.0
  • LBL tcpdump 3.7.1
  • LBL tcpdump 3.7.2
  • LBL tcpdump 3.8.1
  • Red Hat arpwatch-2.1a11-1.i386.rpm Null
  • Red Hat Fedora Core1
  • Red Hat libpcap-0.7.2-1.i386.rpm
  • Red Hat tcpdump-3.7.2-1.i386.rpm
  • SCO Unixware 7.1.3 up
  • SGI ProPack 2.3.0
  • SGI ProPack 2.4.0

References

  • BugTraq: 9423
  • CVE: CVE-2004-0057
  • URL: http://downloads.securityfocus.com/vulnerabilities/exploits/ST-tcphump.c
  • URL: http://www.kb.cert.org/vuls/id/174086

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out