Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2005-1267

Опубликовано: 10 июн. 2005
Источник: nvd
CVSS2: 5
EPSS Средний

Описание

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.3:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.9:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.9.1:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86_64:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 93%
0.1127
Средний

5 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
около 20 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

redhat
около 20 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

debian
около 20 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle ...

github
больше 3 лет назад

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

EPSS

Процентиль: 93%
0.1127
Средний

5 Medium

CVSS2

Дефекты

NVD-CWE-Other