tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/15125 | third-party-advisory x_refsource_SECUNIA |
| http://secunia.com/advisories/17101 | third-party-advisory x_refsource_SECUNIA |
| http://www.redhat.com/support/errata/RHSA-2005-421.html | vendor-advisory x_refsource_REDHAT |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9601 | vdb-entry signature x_refsource_OVAL |
| http://www.securityfocus.com/archive/1/396932 | mailing-list x_refsource_BUGTRAQ |
| http://www.debian.org/security/2005/dsa-850 | vendor-advisory x_refsource_DEBIAN |
| http://www.redhat.com/support/errata/RHSA-2005-417.html | vendor-advisory x_refsource_REDHAT |
| http://www.securityfocus.com/archive/1/430292/100/0/threaded | vendor-advisory x_refsource_FEDORA |
| ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.60/SCOSA-2005.60.txt | vendor-advisory x_refsource_SCO |
| http://secunia.com/advisories/18146 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/bid/13389 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|