Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tcpdump | Tcpdump | * | 3.9.6 (including) |
Red Hat Enterprise Linux 4 | RedHat | tcpdump-14:3.8.2-12.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | tcpdump-14:3.9.4-11.el5 | * |
Tcpdump | Ubuntu | dapper | * |
Tcpdump | Ubuntu | devel | * |
Tcpdump | Ubuntu | edgy | * |
Tcpdump | Ubuntu | feisty | * |