The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tcpdump | Lbl | 3.4 (including) | 3.4 (including) |
Tcpdump | Lbl | 3.4a6 (including) | 3.4a6 (including) |
Tcpdump | Lbl | 3.5 (including) | 3.5 (including) |
Tcpdump | Lbl | 3.5.2 (including) | 3.5.2 (including) |
Tcpdump | Lbl | 3.5_alpha (including) | 3.5_alpha (including) |
Tcpdump | Lbl | 3.6.2 (including) | 3.6.2 (including) |
Tcpdump | Lbl | 3.6.3 (including) | 3.6.3 (including) |
Tcpdump | Lbl | 3.7 (including) | 3.7 (including) |
Tcpdump | Lbl | 3.7.1 (including) | 3.7.1 (including) |
Tcpdump | Lbl | 3.7.2 (including) | 3.7.2 (including) |
Tcpdump | Lbl | 3.8.1 (including) | 3.8.1 (including) |
Tcpdump | Lbl | 3.8.2 (including) | 3.8.2 (including) |
Tcpdump | Lbl | 3.8.3 (including) | 3.8.3 (including) |
Tcpdump | Lbl | 3.9 (including) | 3.9 (including) |
Tcpdump | Lbl | 3.9.1 (including) | 3.9.1 (including) |
Red Hat Enterprise Linux 4 | RedHat | tcpdump-14:3.8.2-10.RHEL4 | * |