Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2005-1267

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.113
EPSS Ranking 93.1%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2005-1267
  • Lbl » Tcpdump » Version: 3.4
    cpe:2.3:a:lbl:tcpdump:3.4
  • Lbl » Tcpdump » Version: 3.4a6
    cpe:2.3:a:lbl:tcpdump:3.4a6
  • Lbl » Tcpdump » Version: 3.5
    cpe:2.3:a:lbl:tcpdump:3.5
  • Lbl » Tcpdump » Version: 3.5.2
    cpe:2.3:a:lbl:tcpdump:3.5.2
  • Lbl » Tcpdump » Version: 3.5_alpha
    cpe:2.3:a:lbl:tcpdump:3.5_alpha
  • Lbl » Tcpdump » Version: 3.6.2
    cpe:2.3:a:lbl:tcpdump:3.6.2
  • Lbl » Tcpdump » Version: 3.6.3
    cpe:2.3:a:lbl:tcpdump:3.6.3
  • Lbl » Tcpdump » Version: 3.7
    cpe:2.3:a:lbl:tcpdump:3.7
  • Lbl » Tcpdump » Version: 3.7.1
    cpe:2.3:a:lbl:tcpdump:3.7.1
  • Lbl » Tcpdump » Version: 3.7.2
    cpe:2.3:a:lbl:tcpdump:3.7.2
  • Lbl » Tcpdump » Version: 3.8.1
    cpe:2.3:a:lbl:tcpdump:3.8.1
  • Lbl » Tcpdump » Version: 3.8.2
    cpe:2.3:a:lbl:tcpdump:3.8.2
  • Lbl » Tcpdump » Version: 3.8.3
    cpe:2.3:a:lbl:tcpdump:3.8.3
  • Lbl » Tcpdump » Version: 3.9
    cpe:2.3:a:lbl:tcpdump:3.9
  • Lbl » Tcpdump » Version: 3.9.1
    cpe:2.3:a:lbl:tcpdump:3.9.1
  • Gentoo » Linux » Version: N/A
    cpe:2.3:o:gentoo:linux:-
  • Gentoo » Linux » Version: 1.2
    cpe:2.3:o:gentoo:linux:1.2
  • Gentoo » Linux » Version: 1.4
    cpe:2.3:o:gentoo:linux:1.4
  • Gentoo » Linux » Version: 2.1.30
    cpe:2.3:o:gentoo:linux:2.1.30
  • Gentoo » Linux » Version: 2.2.28
    cpe:2.3:o:gentoo:linux:2.2.28
  • Gentoo » Linux » Version: 2.3.30
    cpe:2.3:o:gentoo:linux:2.3.30
  • Mandrakesoft » Mandrake Linux » Version: 10.1
    cpe:2.3:o:mandrakesoft:mandrake_linux:10.1
  • Mandrakesoft » Mandrake Linux » Version: 10.2
    cpe:2.3:o:mandrakesoft:mandrake_linux:10.2
  • Redhat » Fedora Core » Version: core_3.0
    cpe:2.3:o:redhat:fedora_core:core_3.0
  • Redhat » Fedora Core » Version: core_4.0
    cpe:2.3:o:redhat:fedora_core:core_4.0
  • Trustix » Secure Linux » Version: 2.0
    cpe:2.3:o:trustix:secure_linux:2.0
  • Trustix » Secure Linux » Version: 2.1
    cpe:2.3:o:trustix:secure_linux:2.1
  • Trustix » Secure Linux » Version: 2.2
    cpe:2.3:o:trustix:secure_linux:2.2


Contact Us

Shodan ® - All rights reserved