CVE-2005-1267

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.3:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.9:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.9.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86_64:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://secunia.com/advisories/15634/ - Patch, Vendor Advisory () http://secunia.com/advisories/15634/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17118 - () http://secunia.com/advisories/17118 -
References () http://www.debian.org/security/2005/dsa-854 - () http://www.debian.org/security/2005/dsa-854 -
References () http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html - Patch, Vendor Advisory () http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-505.html - () http://www.redhat.com/support/errata/RHSA-2005-505.html -
References () http://www.securityfocus.com/archive/1/430292/100/0/threaded - () http://www.securityfocus.com/archive/1/430292/100/0/threaded -
References () http://www.securityfocus.com/bid/13906 - () http://www.securityfocus.com/bid/13906 -
References () http://www.trustix.org/errata/2005/0028/ - Patch, Vendor Advisory () http://www.trustix.org/errata/2005/0028/ - Patch, Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 - Patch, Vendor Advisory () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 - Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148 -

Information

Published : 2005-06-10 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-1267

Mitre link : CVE-2005-1267

CVE.ORG link : CVE-2005-1267


JSON object : View

Products Affected

trustix

  • secure_linux

redhat

  • fedora_core

gentoo

  • linux

mandrakesoft

  • mandrake_linux

lbl

  • tcpdump