The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Threat-Mapped Scoring
Score: 1.5
Priority: P4 - Informational (Low)
EPSS
Score: 0.1127Percentile:
0.93215
CVSS Scoring
CVSS v2 Score: 5.0
Severity:
Affected Products
cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.8.3:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.9:*:*:*:*:*:*:*
cpe:2.3:a:lbl:tcpdump:3.9.1:*:*:*:*:*:*:*
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86_64:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me