The L2TP protocol parser in tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (infinite loop and memory consumption) via a packet with invalid data to UDP port 1701, which causes l2tp_avp_print to use a bad length value when calling print_octets.
lwn.net/Alerts/66805/
marc.info/?l=bugtraq&m=107193841728533&w=2
marc.info/?l=bugtraq&m=107213553214985&w=2
marc.info/?l=tcpdump-workers&m=107228187124962&w=2
secunia.com/advisories/10636
secunia.com/advisories/10652
secunia.com/advisories/10668
secunia.com/advisories/10718
www.debian.org/security/2004/dsa-425
www.mandriva.com/security/advisories?name=MDKSA-2004:008
www.securityfocus.com/archive/1/350238/30/21640/threaded
www.securitytracker.com/id?1008748