#VU22019 Infinite loop


Published: 2019-10-21

Vulnerability identifier: #VU22019

Vulnerability risk: Medium

CVSSv3.1:

CVE-ID: CVE-2018-16300

CWE-ID: CWE-835

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Tcpdump
Server applications / DLP, anti-spam, sniffers

Vendor: Tcpdump.org

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in print-bgp.c:bgp_attr_print() function in the BPG parser. A remote attacker can pass specially crafted data to the affected application, consume all available system resources and cause denial of service conditions.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Tcpdump: 4.9.0 - 4.9.2


CPE

External links
http://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
http://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a
http://lists.debian.org/debian-lts-announce/2019/10/msg00015.html


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability