Executive Summary
Summary | |
---|---|
Title | New tcpdump packages fix denial of service |
Informations | |||
---|---|---|---|
Name | DSA-854 | First vendor Publication | 2005-10-09 |
Vendor | Debian | Last vendor Modification | 2005-10-09 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Simon Nielsen discovered that the BGP dissector in tcpdump, a powerful tool for network monitoring and data acquisition, does not properly handle a -1 return value from an internal function that decodes data packets. A specially crafted BGP packet can cause a denial of service via an infinite loop. The old stable distribution (woody) is not affected by this problem. For the stable distribution (sarge) this problem has been fixed in version 3.8.3-5sarge1. We recommend that you upgrade your tcpdump package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-854 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11148 | |||
Oval ID: | oval:org.mitre.oval:def:11148 | ||
Title: | The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet. | ||
Description: | The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1267 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200505-06 (tcpdump) File : nvt/glsa_200505_06.nasl |
2008-09-04 | Name : FreeBSD Ports: tcpdump File : nvt/freebsd_tcpdump1.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-05:10.tcpdump.asc) File : nvt/freebsdsa_tcpdump.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 854-1 (tcpdump) File : nvt/deb_854_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2005-195-10 tcpdump DoS File : nvt/esoft_slk_ssa_2005_195_10.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17227 | tcpdump bgp_update_print() Function Malformed BGP Protocol Data DoS tcpdump contains a flaw that may allow a remote denial of service. The issue is triggered when a crafted BGP packet is parsed, causing an infinite loop, and will result in loss of availability for the service. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-505.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-141-1.nasl - Type : ACT_GATHER_INFO |
2005-10-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-854.nasl - Type : ACT_GATHER_INFO |
2005-07-16 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2005-195-10.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_9fae0f1fdf8211d9b8750001020eed82.nasl - Type : ACT_GATHER_INFO |
2005-06-28 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-407.nasl - Type : ACT_GATHER_INFO |
2005-06-16 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2005-101.nasl - Type : ACT_GATHER_INFO |
2005-06-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-505.nasl - Type : ACT_GATHER_INFO |
2005-06-10 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-406.nasl - Type : ACT_GATHER_INFO |
2005-05-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200505-06.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:30 |
|