135 lines
3.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2004-0183",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-05-04T04:00:00.000",
"lastModified": "2017-10-11T01:29:22.777",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via ISAKMP packets containing a Delete payload with a large number of SPI's, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite."
},
{
"lang": "es",
"value": "TCPDUMP 3.8.1 y anteriores permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante paquetes ISAKMP conteniendo un carga \u00fatil de Dorrado con un gran n\u00fameo de SPIs, lo que causa una lectura fuera de l\u00edmites, como se ha demostrado por el paquete de pruebas de protocolo ISAKMP Striker."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lbl:tcpdump:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.8.1",
"matchCriteriaId": "F64FF8C5-C68F-4AD2-A370-1ACE4997AB3B"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=108067265931525&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1009593",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2004/dsa-478",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/240790",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.rapid7.com/advisories/R7-0017.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2004-219.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/10003",
"source": "cve@mitre.org"
},
{
"url": "http://www.tcpdump.org/tcpdump-changes.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.trustix.org/errata/2004/0015",
"source": "cve@mitre.org"
},
{
"url": "https://bugzilla.fedora.us/show_bug.cgi?id=1468",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15680",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A972",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9971",
"source": "cve@mitre.org"
}
]
}