Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-1267

Опубликовано: 10 июн. 2005
Источник: debian
EPSS Средний

Описание

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tcpdumpfixed3.9.0.cvs.20050614-1package

EPSS

Процентиль: 93%
0.1127
Средний

Связанные уязвимости

ubuntu
около 20 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

redhat
около 20 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

nvd
около 20 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

github
больше 3 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

EPSS

Процентиль: 93%
0.1127
Средний