Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-0184Out-of-bounds Read in Tcpdump

Severity
5.0MEDIUMNVD
EPSS
65.3%
top 1.51%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 4
Latest updateApr 29

Description

Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/tcpdump< tcpdump 3.7.2-4 (bookworm)
Debiantcpdump/tcpdump< 3.7.2-4+3
NVDtcpdump/tcpdump3.8.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rm38-jqfm-qmjm: Integer underflow in the isakmp_id_print for TCPDUMP 32022-04-29
OSV
CVE-2004-0184: Integer underflow in the isakmp_id_print for TCPDUMP 32004-05-04

💥Exploits & PoCs

1
Exploit-DB
tcpdump - ISAKMP Identification Payload Integer Overflow2004-04-05

📋Vendor Advisories

2
Red Hat
security flaw2004-03-29
Debian
CVE-2004-0184: tcpdump - Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows re...2004

📐Framework References

1
CWE
Out-of-bounds Read

💬Community

1
Bugzilla
CVE-2004-0184 security flaw2018-08-16
CVE-2004-0184 — Out-of-bounds Read in Debian Tcpdump | cvebase