+++ This bug was initially created as a clone of Bug #159208 +++
Simon L. Nielsen alerted vendor-sec to this issue:
While working on the FreeBSD Security Advisory for the recent tcpdump
issues (CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280) I noticed
that there is another similar infinite loop DoS vulnerability in the
BGP handling code.
The problem lies in bgp_update_print() in print-bgp.c around line
1652, where the -1 return value from decode_prefix4() is not properly
This problem was fixed in tcpdump CVS repository in print-bgp.c
v. 1.95 on May 5, but it hasn't gone to the tcpdump 3.8 branch, and
hasn't been included in any of the vendor patch sets for earlier DoS
vulnerabilities that I have seen.
This issue should also affect FC4
The upstream patch is attachment 115005 [details]
The demo exploit is attachment 115006 [details]
Removing embargo as per Simon Nielsen msg to vendor-sec
Has this update made its way to FC4 by chance?
Update for FC4 is done (ID's 407).