Bug 91571 (CVE-2005-1280) - VUL-0: CVE-2005-1280: tcpdump another DoS
Summary: VUL-0: CVE-2005-1280: tcpdump another DoS
Status: RESOLVED DUPLICATE of bug 80582
Alias: CVE-2005-1280
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other All
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Marian Jancar
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2005-1280: CVSS v2 Base Score: 5....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-06-21 07:13 UTC by Thomas Biege
Modified: 2021-11-03 14:44 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2005-06-21 07:13:10 UTC
Hi,
seems like tcpdump has more problems... no suprise.

Another tcpdump BGP infinite loop vulnerability (CAN-2005-1267)
Von: 
"Simon L. Nielsen" <simon@freebsd.org>
  An: 
bugtraq@securityfocus.com
  Datum: 
Sonntag - 11:15:53
   
  Spam-Status: Spamassassin Mit 0%iger Wahrscheinlichkeit Spam.

Ausführlicher Bericht:
No, hits=-2.9 required=5.0 tests=BAYES_00,DATE_IN_FUTURE_06_12  autolearn=no
version=2.64  
Nachricht wurde signiert mit dem unbekannten Schlüssel 0x87DA5C0D27359A51.
Die Gültigkeit der Signatur konnte nicht überprüft werden.
Status:Kein öffentlicher Schlüssel zur Überprüfung der Signatur vorhanden
  Hello

While working on the FreeBSD Security Advisory for the recent tcpdump
issues (CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280) I noticed
another similar infinite loop DoS vulnerability in the BGP handling
code.  It affects at least tcpdump 3.8.3 and tcpdump 3.9 snapshots
from before May 5.

The problem was in bgp_update_print() in print-bgp.c around line 1652
(for tcpdump 3.8.3), where the -1 return value from decode_prefix4()
was not properly handled.

The issue was verified to cause an infinite loop against tcpdump 3.8.3
running on FreeBSD (before FreeBSD-SA-05:10.tcpdump), which included
the patches for the first set of tcpdump DoS vulnerabilities, and
against a Gentoo Linux with tcpdump-3.8.3-r2 (Gentoo has released an
update for GLSA-200505-06 which addresses the new issue).

The very ugly proof-of-concept exploit code, which is based on
bgp4_update.c from libnet, and the patch which fixes the problem
(based on part of print-bgp.c v. 1.95) can be found at the URL's
mentioned below.  The proof-of-concept has been tested on FreeBSD
using libnet 1.1.2.1.

Note that this issue has been public for a bit and most major vendors
has already release advisories for this issue, so this email is mainly
to have a reference for the issue.

This issue has been assigned the CVE name CAN-2005-1267.

http://people.freebsd.org/~simon/security/CAN-2005-1267/tcpdump-bgp-update-poc.c
http://people.freebsd.org/~simon/security/CAN-2005-1267/tcpdump-bgp-infinite-loop2.patch

-- 
Simon L. Nielsen
Comment 1 Marian Jancar 2005-06-22 16:36:15 UTC
this had been fixed in bug#80582

*** This bug has been marked as a duplicate of 80582 ***
Comment 2 Thomas Biege 2009-10-13 21:29:01 UTC
CVE-2005-1280: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)