Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-1267

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2005-1267
Last Modified 21 Aug 2010 12:28:22
Published 10 Jun 2005 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-1267

Summary

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

Vulnerable Systems

Operating System

  • Gentoo Linux

  • Mandrakesoft Mandrake Linux 10.1

  • Mandrakesoft Mandrake Linux 10.2

  • Redhat Fedora Core Core 3.0

  • Redhat Fedora Core Core 4.0

  • Trustix Secure Linux 2.0

  • Trustix Secure Linux 2.1

  • Trustix Secure Linux 2.2

Application

  • Lbl Tcpdump 3.4

  • Lbl Tcpdump 3.4a6

  • Lbl Tcpdump 3.5

  • Lbl Tcpdump 3.5 Alpha

  • Lbl Tcpdump 3.5.2

  • Lbl Tcpdump 3.6.2

  • Lbl Tcpdump 3.6.3

  • Lbl Tcpdump 3.7

  • Lbl Tcpdump 3.7.1

  • Lbl Tcpdump 3.7.2

  • Lbl Tcpdump 3.8.1

  • Lbl Tcpdump 3.8.2

  • Lbl Tcpdump 3.8.3

  • Lbl Tcpdump 3.9

  • Lbl Tcpdump 3.9.1


References

MISC - https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208

TRUSTIX - 2005-0028

FEDORA - FEDORA-2005-406

SECUNIA - 15634

BID - 13906

FEDORA - FLSA:156139

REDHAT - RHSA-2005:505

DEBIAN - DSA-854

SECUNIA - 17118


Last Updated: 27 May 2016 10:40:06