5
CVSSv2

CVE-2005-1267

Published: 10/06/2005 Updated: 19/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.

Vulnerable Product Search on Vulmon Subscribe to Product

lbl tcpdump 3.6.3

lbl tcpdump 3.7

lbl tcpdump 3.9.1

lbl tcpdump 3.5_alpha

lbl tcpdump 3.6.2

lbl tcpdump 3.8.3

lbl tcpdump 3.9

lbl tcpdump 3.5

lbl tcpdump 3.5.2

lbl tcpdump 3.8.1

lbl tcpdump 3.8.2

lbl tcpdump 3.4

lbl tcpdump 3.4a6

lbl tcpdump 3.7.1

lbl tcpdump 3.7.2

trustix secure linux 2.0

trustix secure linux 2.1

mandrakesoft mandrake linux 10.2

redhat fedora core core_3.0

redhat fedora core core_4.0

mandrakesoft mandrake linux 10.1

gentoo linux

trustix secure linux 2.2

Vendor Advisories

Synopsis tcpdump security update Type/Severity Security Advisory: Low Topic Updated tcpdump packages that fix a security issue are now availableThis update has been rated as having low security impact by the RedHat Security Response Team Description Tcpdump is a command line tool for moni ...
It was discovered that certain invalid BGP packets triggered an infinite loop in tcpdump, which caused tcpdump to stop working This could be abused by a remote attacker to bypass tcpdump analysis of network traffic ...
Simon Nielsen discovered that the BGP dissector in tcpdump, a powerful tool for network monitoring and data acquisition, does not properly handle a -1 return value from an internal function that decodes data packets A specially crafted BGP packet can cause a denial of service via an infinite loop The old stable distribution (woody) is not affecte ...

Exploits

/* * 2005-05-31: Modified by simon@FreeBSDorg to test tcpdump infinite * loop vulnerability * * libnet 11 * Build a BGP4 update message with what you want as payload * * Copyright (c) 2003 Fr d ric Raynal <pappy at security-labs organization> * All rights reserved * * Examples: * * empty BGP UPDATE message: * * # /bgp4_update -s 1111 ...