Description
The L2TP protocol parser in tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (infinite loop and memory consumption) via a packet with invalid data to UDP port 1701, which causes l2tp_avp_print to use a bad length value when calling print_octets.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Przemyslaw Frasunek · textdoslinux
https://www.exploit-db.com/exploits/23452
References (12)
Core 12
Core References
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10718
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10668
Mailing List mailing-list
x_refsource_mlist
http://marc.info/?l=tcpdump-workers&m=107228187124962&w=2
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10636
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1008748
Various Sources vendor-advisory
x_refsource_engarde
http://lwn.net/Alerts/66805/
Vendor Advisory vendor-advisory
x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2004:008
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/350238/30/21640/threaded
Patch, Vendor Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2004/dsa-425
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10652
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107213553214985&w=2
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107193841728533&w=2
Scores
EPSS
0.2139
EPSS Percentile
95.7%
Details
Status
published
Products (6)
lbl/tcpdump
3.4
lbl/tcpdump
3.5
lbl/tcpdump
3.5.2
lbl/tcpdump
3.6.2
lbl/tcpdump
3.6.3
lbl/tcpdump
3.7
Published
Feb 17, 2004
Tracked Since
Feb 18, 2026