2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2003-1029" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The L2TP protocol parser in tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (infinite loop and memory consumption) via a packet with invalid data to UDP port 1701, which causes l2tp_avp_print to use a bad length value when calling print_octets."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20031220 Remote crash in tcpdump from OpenBSD" ,
"refsource" : "BUGTRAQ" ,
2017-10-16 12:31:07 -04:00
"url" : "http://marc.info/?l=bugtraq&m=107193841728533&w=2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20031221 Re: Remote crash in tcpdump from OpenBSD" ,
"refsource" : "BUGTRAQ" ,
2017-10-16 12:31:07 -04:00
"url" : "http://marc.info/?l=bugtraq&m=107213553214985&w=2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities." ,
"refsource" : "BUGTRAQ" ,
2018-10-19 11:05:17 -04:00
"url" : "http://www.securityfocus.com/archive/1/350238/30/21640/threaded"
2017-10-16 12:31:07 -04:00
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "[tcpdump-workers] 20031224 Seg fault of tcpdump (v 3.8.1 and below) with malformed l2tp packets" ,
"refsource" : "MLIST" ,
2017-10-16 12:31:07 -04:00
"url" : "http://marc.info/?l=tcpdump-workers&m=107228187124962&w=2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-425" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2004/dsa-425"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "ESA-20040119-002" ,
"refsource" : "ENGARDE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://lwn.net/Alerts/66805/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2004:008" ,
"refsource" : "MANDRAKE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:008"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1008748" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securitytracker.com/id?1008748"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "10636" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/10636"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "10652" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/10652"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "10668" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/10668"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "10718" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/10718"
}
]
}
}