Vulnerability Name:

CVE-2005-1279 (CCN-20289)

Assigned:2005-04-26
Published:2005-04-26
Updated:2018-10-19
Summary:tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-05:10.tcpdump
Infinite loops in tcpdump protocol decoding

Source: SCO
Type: UNKNOWN
SCOSA-2005.60

Source: MITRE
Type: CNA
CVE-2005-1279

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2005:986
Security fixes for tcpdump

Source: CCN
Type: RHSA-2005-417
tcpdump security update

Source: CCN
Type: RHSA-2005-421
tcpdump security update

Source: CCN
Type: SA15125
tcpdump Multiple Denial of Service Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
15125

Source: SECUNIA
Type: UNKNOWN
17101

Source: SECUNIA
Type: UNKNOWN
18146

Source: CCN
Type: ASA-2006-041
Tcpdump Denial of Service (SCOSA-2005.60)

Source: DEBIAN
Type: UNKNOWN
DSA-850

Source: DEBIAN
Type: DSA-850
tcpdump -- infinite loop

Source: CCN
Type: GLSA-200505-06
TCPDump: Decoding routines Denial of Service vulnerability

Source: REDHAT
Type: UNKNOWN
RHSA-2005:417

Source: REDHAT
Type: UNKNOWN
RHSA-2005:421

Source: BUGTRAQ
Type: Exploit, Vendor Advisory
20050426 tcpdump[v3.8.x/v3.9.1]: ISIS, BGP, and LDP infinite loop DOS exploits.

Source: FEDORA
Type: UNKNOWN
FLSA:156139

Source: CCN
Type: BID-13380
TCPDump BGP Decoding Routines Denial Of Service Vulnerability

Source: BID
Type: UNKNOWN
13389

Source: CCN
Type: BID-13389
tcpdump LDP Decoding Routines Denial Of Service Vulnerability

Source: CCN
Type: tcpdump Web site
TCPDUMP public repository

Source: CCN
Type: TLSA-2005-63
Tcpdump denial of service attack

Source: CCN
Type: USN-119-1
tcpdump vulnerabilities

Source: XF
Type: UNKNOWN
tcpdump-bgp-dos(20289)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9601

Source: SUSE
Type: SUSE-SR:2005:017
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:lbl:tcpdump:*:*:*:*:*:*:*:* (Version <= 3.8.3)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-1279 (CCN-20290)

    Assigned:2005-04-26
    Published:2005-04-26
    Updated:2018-10-19
    Summary:tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: FreeBSD Security Advisory FreeBSD-SA-05:10.tcpdump
    Infinite loops in tcpdump protocol decoding

    Source: CCN
    Type: SGI Security Advisory 20050502-01-U
    SGI Advanced Linux Environment 3 Security Update #37

    Source: MITRE
    Type: CNA
    CVE-2005-1279

    Source: CCN
    Type: nectiva Linux Security Announcement CLSA-2005:986
    Security fixes for tcpdump

    Source: CCN
    Type: RHSA-2005-417
    tcpdump security update

    Source: CCN
    Type: RHSA-2005-421
    tcpdump security update

    Source: CCN
    Type: SA15125
    tcpdump Multiple Denial of Service Vulnerabilities

    Source: CCN
    Type: ASA-2006-041
    Tcpdump Denial of Service (SCOSA-2005.60)

    Source: DEBIAN
    Type: DSA-850
    tcpdump -- infinite loop

    Source: CCN
    Type: GLSA-200505-06
    TCPDump: Decoding routines Denial of Service vulnerability

    Source: CCN
    Type: BID-13389
    tcpdump LDP Decoding Routines Denial Of Service Vulnerability

    Source: CCN
    Type: tcpdump Web site
    TCPDUMP public repository

    Source: CCN
    Type: TLSA-2005-63
    Tcpdump denial of service attack

    Source: CCN
    Type: USN-119-1
    tcpdump vulnerabilities

    Source: XF
    Type: UNKNOWN
    tcpdump-idpprint-dos(20290)

    Source: SUSE
    Type: SUSE-SR:2005:017
    SUSE Security Summary Report

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20051279
    V
    CVE-2005-1279
    2015-11-16
    oval:org.mitre.oval:def:9601
    V
    tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
    2013-04-29
    oval:org.debian:def:850
    V
    infinite loop
    2005-10-09
    oval:com.redhat.rhsa:def:20050417
    P
    RHSA-2005:417: tcpdump security update (Moderate)
    2005-05-11
    oval:com.redhat.rhsa:def:20050421
    P
    RHSA-2005:421: tcpdump security update (Moderate)
    2005-05-11
    BACK
    lbl tcpdump *