Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:2486 |
| Message | DOS ISAKMP invalid identification payload attempt |
| Summary | This event is generated when an attempt is made to exploit a denial of service (DoS) associated with tcpdump decoding of an isakmp payload. |
| Impact | A successful attack may cause a DoS of the host running tcpdump. |
| Detailed Information | The tcpdump decode of an isakmp packet with an identification payload may be susceptible to a DoS attack. This occurs because the code does not properly convert the payload length field from network-to-host byte order. This may cause tcpdump to crash when specific values are supplied to the payload length. |
| Affected Systems | Hosts running tcpdump versions 3.8.1 and earlier |
| Attack Scenarios | An attacker can create and send a malformed isakmp packet that may cause a host running tcpdump and analyzing the packet to crash. |
| Ease of Attack | Simple. Exploit code exists. |
| Corrective Action | Upgrade to the latest non-affected version of the software. |
| Additional References | |
| Rule References | bugtraq: 10004 cve: 2004-0184 |
--
DID:149541
--
http://www.aanval.com/