From the advisory: ======================================================= A vulnerability exists in the parsing of ISAKMP packets (UDP port 500) that allows an attacker to force TCPDUMP into an infinite loop upon receipt of a specially crafted packet. Solution: This vulnerability was already closed by Guy Harris during routine development; users of the CVS version downloaded since September 6, 2002 (revision 1.34 of print-isakmp.c) are not vulerable. The new 3.7.2 tcpdump release includes this and a couple of additional security fixes; the 0.7.2 libpcap release includes new functionality but no security fixes. The following packages are available: http://www.tcpdump.org/release/tcpdump-3.7.2.tar.gz http://www.tcpdump.org/release/libpcap-0.7.2.tar.gz Reproducible: Always Steps to Reproduce:
glsa sent