CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
93.9%
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Vendor | Product | Version | CPE |
---|---|---|---|
lbl | tcpdump | 3.4 | cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:* |
lbl | tcpdump | 3.4a6 | cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:* |
lbl | tcpdump | 3.5 | cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:* |
lbl | tcpdump | 3.5.2 | cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:* |
lbl | tcpdump | 3.5_alpha | cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:* |
lbl | tcpdump | 3.6.2 | cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:* |
lbl | tcpdump | 3.6.3 | cpe:2.3:a:lbl:tcpdump:3.6.3:*:*:*:*:*:*:* |
lbl | tcpdump | 3.7 | cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:* |
lbl | tcpdump | 3.7.1 | cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:* |
lbl | tcpdump | 3.7.2 | cpe:2.3:a:lbl:tcpdump:3.7.2:*:*:*:*:*:*:* |
secunia.com/advisories/15634/
secunia.com/advisories/17118
www.debian.org/security/2005/dsa-854
www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html
www.redhat.com/support/errata/RHSA-2005-505.html
www.securityfocus.com/archive/1/430292/100/0/threaded
www.securityfocus.com/bid/13906
www.trustix.org/errata/2005/0028/
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148