The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted BGP packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
lbl tcpdump 3.6.3 |
||
lbl tcpdump 3.7 |
||
lbl tcpdump 3.9.1 |
||
lbl tcpdump 3.5_alpha |
||
lbl tcpdump 3.6.2 |
||
lbl tcpdump 3.8.3 |
||
lbl tcpdump 3.9 |
||
lbl tcpdump 3.5 |
||
lbl tcpdump 3.5.2 |
||
lbl tcpdump 3.8.1 |
||
lbl tcpdump 3.8.2 |
||
lbl tcpdump 3.4 |
||
lbl tcpdump 3.4a6 |
||
lbl tcpdump 3.7.1 |
||
lbl tcpdump 3.7.2 |
||
trustix secure linux 2.0 |
||
trustix secure linux 2.1 |
||
mandrakesoft mandrake linux 10.2 |
||
redhat fedora core core_3.0 |
||
redhat fedora core core_4.0 |
||
mandrakesoft mandrake linux 10.1 |
||
gentoo linux |
||
trustix secure linux 2.2 |