The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Tcpdump | Lbl | 3.4 (including) | 3.4 (including) |
| Tcpdump | Lbl | 3.4a6 (including) | 3.4a6 (including) |
| Tcpdump | Lbl | 3.5 (including) | 3.5 (including) |
| Tcpdump | Lbl | 3.5.2 (including) | 3.5.2 (including) |
| Tcpdump | Lbl | 3.5_alpha (including) | 3.5_alpha (including) |
| Tcpdump | Lbl | 3.6.2 (including) | 3.6.2 (including) |
| Tcpdump | Lbl | 3.6.3 (including) | 3.6.3 (including) |
| Tcpdump | Lbl | 3.7 (including) | 3.7 (including) |
| Tcpdump | Lbl | 3.7.1 (including) | 3.7.1 (including) |
| Tcpdump | Lbl | 3.7.2 (including) | 3.7.2 (including) |
| Tcpdump | Lbl | 3.8.1 (including) | 3.8.1 (including) |
| Tcpdump | Lbl | 3.8.2 (including) | 3.8.2 (including) |
| Tcpdump | Lbl | 3.8.3 (including) | 3.8.3 (including) |
| Tcpdump | Lbl | 3.9 (including) | 3.9 (including) |
| Tcpdump | Lbl | 3.9.1 (including) | 3.9.1 (including) |
| Red Hat Enterprise Linux 4 | RedHat | tcpdump-14:3.8.2-10.RHEL4 | * |