{"api_version":"1","generated_at":"2026-04-22T23:08:44+00:00","cve":"CVE-2005-1267","urls":{"html":"https://cve.report/CVE-2005-1267","api":"https://cve.report/api/cve/CVE-2005-1267.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-1267","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-1267"},"summary":{"title":"CVE-2005-1267","description":"The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.","state":"PUBLISHED","assigner":"redhat","published_at":"2005-06-10 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/17118","name":"http://secunia.com/advisories/17118","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Debian update for tcpdump","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/13906","name":"http://www.securityfocus.com/bid/13906","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"tcpdump BGP Decoding Routines Denial Of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.debian.org/security/2005/dsa-854","name":"http://www.debian.org/security/2005/dsa-854","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-854-1 tcpdump","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-505.html","name":"http://www.redhat.com/support/errata/RHSA-2005-505.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/430292/100/0/threaded","name":"http://www.securityfocus.com/archive/1/430292/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html","name":"http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"[SECURITY] Fedora Core 3 Update: tcpdump-3.8.2-9.FC3","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/15634/","name":"http://secunia.com/advisories/15634/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - tcpdump BGP Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.trustix.org/errata/2005/0028/","name":"http://www.trustix.org/errata/2005/0028/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"-1","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208","name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"159208 – CAN-2005-1267 tcpdump BGP DoS","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-1267","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1267","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"gentoo","cpe5":"linux","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.4a6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.5_alpha","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.6.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.8.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.8.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lbl","cpe5":"tcpdump","cpe6":"3.9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.1","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandrakesoft","cpe5":"mandrake_linux","cpe6":"10.2","cpe7":"*","cpe8":"x86_64","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora_core","cpe6":"core_4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"trustix","cpe5":"secure_linux","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"trustix","cpe5":"secure_linux","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"1267","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"trustix","cpe5":"secure_linux","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T21:44:05.956Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"13906","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/13906"},{"name":"17118","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17118"},{"name":"2005-0028","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2005/0028/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208"},{"name":"15634","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/15634/"},{"name":"RHSA-2005:505","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-505.html"},{"name":"oval:org.mitre.oval:def:11148","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148"},{"name":"FEDORA-2005-406","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html"},{"name":"FLSA:156139","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/archive/1/430292/100/0/threaded"},{"name":"DSA-854","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-854"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-06-13T00:00:00.000Z","descriptions":[{"lang":"en","value":"The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"13906","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/13906"},{"name":"17118","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17118"},{"name":"2005-0028","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2005/0028/"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208"},{"name":"15634","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/15634/"},{"name":"RHSA-2005:505","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-505.html"},{"name":"oval:org.mitre.oval:def:11148","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148"},{"name":"FEDORA-2005-406","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html"},{"name":"FLSA:156139","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/archive/1/430292/100/0/threaded"},{"name":"DSA-854","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-854"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2005-1267","datePublished":"2005-06-20T04:00:00.000Z","dateReserved":"2005-04-25T00:00:00.000Z","dateUpdated":"2024-08-07T21:44:05.956Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-06-10 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B9B50919-7C67-416D-BA2F-50747CDBE08F"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.4a6:*:*:*:*:*:*:*","matchCriteriaId":"950C6522-3C7F-4E81-8952-246FFE1072C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.5:*:*:*:*:*:*:*","matchCriteriaId":"A6CC000D-857D-4E12-82E6-7F8168B463EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*","matchCriteriaId":"45BACEA9-8C28-4DB6-96F7-D91B06C8EEF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.5_alpha:*:*:*:*:*:*:*","matchCriteriaId":"45083B9F-95CC-4EB7-9591-2146084CBBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*","matchCriteriaId":"C3214AA7-1EB2-4EC8-96AA-2A9985A5EB8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.6.3:*:*:*:*:*:*:*","matchCriteriaId":"B3985632-2246-499E-9F9B-5A416D3AB4F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*","matchCriteriaId":"FD63F004-83A9-4CB3-A26D-E82589ED7FE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*","matchCriteriaId":"5DF65E89-04B7-49F2-ADCE-0BD0A313949E"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.7.2:*:*:*:*:*:*:*","matchCriteriaId":"B76F042D-6D75-4BD3-8530-ED9E760B94A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.8.1:*:*:*:*:*:*:*","matchCriteriaId":"FB530211-6557-4E90-B659-0AC633DEDF00"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.8.2:*:*:*:*:*:*:*","matchCriteriaId":"836F7F79-8ADD-4A4F-BE45-0237206DD055"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.8.3:*:*:*:*:*:*:*","matchCriteriaId":"B6C1376C-68BC-4EBB-9B94-0E65728983A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.9:*:*:*:*:*:*:*","matchCriteriaId":"C793D15A-646A-477F-A91A-945D5148A9D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.9.1:*:*:*:*:*:*:*","matchCriteriaId":"5BB08C13-4146-461A-A35E-D450AAB195E7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"647BA336-5538-4972-9271-383A0EC9378E"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","matchCriteriaId":"3528DABD-B821-4D23-AE12-614A9CA92C46"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*","matchCriteriaId":"9E661D58-18DF-4CCF-9892-F873618F4535"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*","matchCriteriaId":"11D69B83-4EF3-407B-8E8C-DE623F099C17"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86_64:*:*:*:*:*","matchCriteriaId":"F1D16230-3699-4AAA-9CAE-5CAF34628885"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","matchCriteriaId":"EC80CF67-C51D-442C-9526-CFEDE84A6304"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*","matchCriteriaId":"C720DACC-CF4B-4A00-818C-8303A7D7DED6"},{"vulnerable":true,"criteria":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"A67735E5-E43E-4164-BDB2-ADC6E0288E9F"},{"vulnerable":true,"criteria":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5AB70F82-52BB-4D0D-9A24-9AF67278466D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"1267","Ordinal":"1","Title":"CVE-2005-1267","CVE":"CVE-2005-1267","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"1267","Ordinal":"1","NoteData":"The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.","Type":"Description","Title":"CVE-2005-1267"},{"CveYear":"2005","CveId":"1267","Ordinal":"2","NoteData":"2005-06-20","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"1267","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}