Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-1267

11 documents10 sources
Severity
5.0MEDIUM
EPSS
11.3%
top 6.48%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 10
Latest updateMay 1

Description

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages5 packages

Debiantcpdump< 3.9.0.cvs.20050614-1+3
NVDlbl/tcpdump15 versions+14
NVDredhat/fedora_corecore_3.0, core_4.0+1
NVDtrustix/secure_linux2.0, 2.1, 2.2+2
NVDmandrakesoft/mandrake_linux10.1, 10.2+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-p5p7-x2fv-868r: The bgp_update_print function in tcpdump 32022-05-01
CVEList
CVE-2005-1267: The bgp_update_print function in tcpdump 32005-06-20
OSV
CVE-2005-1267: The bgp_update_print function in tcpdump 32005-06-10

💥Exploits & PoCs

1
Exploit-DB
Tcpdump - bgp_update_print Remote Denial of Service2005-06-09

📋Vendor Advisories

3
Ubuntu
tcpdump vulnerability2005-06-21
Red Hat
security flaw2005-06-06
Debian
CVE-2005-1267: tcpdump - The bgp_update_print function in tcpdump 3.x does not properly handle a -1 retur...2005

💬Community

1
Bugzilla
CVE-2005-1267 security flaw2018-08-16