Vulnerability Details : CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Vulnerability category: Denial of service
Products affected by CVE-2005-1267
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86_64:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:lbl:tcpdump:3.7.2:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-1267
6.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-1267
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2005-1267
-
http://www.redhat.com/support/errata/RHSA-2005-505.html
Support
-
http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html
[SECURITY] Fedora Core 3 Update: tcpdump-3.8.2-9.FC3Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/430292/100/0/threaded
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208
159208 – CAN-2005-1267 tcpdump BGP DoSPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/13906
-
http://www.trustix.org/errata/2005/0028/
Trustix | Empowering Trust and Security in the Digital AgePatch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148
404 Not Found
-
http://www.debian.org/security/2005/dsa-854
[SECURITY] [DSA 854-1] New tcpdump packages fix denial of service
Jump to