ID

VAR-200505-1240


CVE

CVE-2005-1280


TITLE

OpenSSL may fail to properly parse invalid ASN.1 structures

Trust: 0.8

sources: CERT/CC: VU#247744

DESCRIPTION

The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4. A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ tcpdump Is a management tool for capturing network traffic and supports multiple protocols. The issue occurs because of the way tcpdump decodes Resource ReSerVation Protocol (RSVP) packets. This issue affects tcpdump 3.9.x/CVS and earlier. This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig72CF56A4065A77499C855538 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable --------------------------------------------------------------------- Fedora Legacy Update Advisory Synopsis: Updated tcpdump packages fix security issues Advisory ID: FLSA:156139 Issue date: 2006-04-04 Product: Red Hat Linux, Fedora Core Keywords: Bugfix, Security CVE Names: CVE-2005-1267, CVE-2005-1278, CVE-2005-1279, CVE-2005-1280 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: Updated tcpdump packages that fix several security issues are now available. 2. Relevant releases/architectures: Red Hat Linux 9 - i386 Fedora Core 1 - i386 Fedora Core 2 - i386 3. Problem description: Several denial of service bugs were found in the way tcpdump processes certain network packets. It is possible for an attacker to inject a carefully crafted packet onto the network, crashing a running tcpdump session. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2005-1267, CVE-2005-1278, CVE-2005-1279, and CVE-2005-1280 to these issues. Users of tcpdump are advised to upgrade to these erratum packages, which contain backported security patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3D156139 6. RPMs required: Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/tcpdump-3.7.2-7.9= =2E4.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/tcpdump-3.7.2-7.9.= 4.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/libpcap-0.7.2-7.9.= 4.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/arpwatch-2.1a11-7.= 9.4.legacy.i386.rpm Fedora Core 1: SRPM: http://download.fedoralegacy.org/fedora/1/updates/SRPMS/tcpdump-3.7.2-8.f= c1.3.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/1/updates/i386/tcpdump-3.7.2-8.fc= 1.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/libpcap-0.7.2-8.fc= 1.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/arpwatch-2.1a11-8.= fc1.3.legacy.i386.rpm Fedora Core 2: SRPM: http://download.fedoralegacy.org/fedora/2/updates/SRPMS/tcpdump-3.8.2-6.F= C2.3.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/2/updates/i386/tcpdump-3.8.2-6.FC= 2.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/2/updates/i386/libpcap-0.8.3-6.FC= 2.3.legacy.i386.rpm http://download.fedoralegacy.org/fedora/2/updates/i386/arpwatch-2.1a13-6.= FC2.3.legacy.i386.rpm 7. Verification: SHA1 sum Package Name --------------------------------------------------------------------- 0beccb4a6dd929174bc2d70d680a2e3c4a094391 redhat/9/updates/i386/tcpdump-3.7.2-7.9.4.legacy.i386.rpm 71e1ffc2c4dbf2a5c754630e198f17af94000e66 redhat/9/updates/i386/libpcap-0.7.2-7.9.4.legacy.i386.rpm 843a832974f531413a8e406491f6c91d09bda24d redhat/9/updates/i386/arpwatch-2.1a11-7.9.4.legacy.i386.rpm 192fa5bbebe8039f3c23b8aa26804d1c4b788412 redhat/9/updates/SRPMS/tcpdump-3.7.2-7.9.4.legacy.src.rpm 1a426b6225718dbd325fbe0c6d54f8904b710103 fedora/1/updates/i386/tcpdump-3.7.2-8.fc1.3.legacy.i386.rpm 45cffdb7d98c2eb03da004d89b776a7050ff5c40 fedora/1/updates/i386/libpcap-0.7.2-8.fc1.3.legacy.i386.rpm 75e263aa296969c873d0475cc1c0785c30ea24d6 fedora/1/updates/i386/arpwatch-2.1a11-8.fc1.3.legacy.i386.rpm 6e86c20a8af1fc607809c713d7ac00ab5e2f717c fedora/1/updates/SRPMS/tcpdump-3.7.2-8.fc1.3.legacy.src.rpm 32d0dcf31fbe12225954cc32dad45dbcb6c5f5e4 fedora/2/updates/i386/tcpdump-3.8.2-6.FC2.3.legacy.i386.rpm c84625e92600faa8566129c8229daa6c328dcee9 fedora/2/updates/i386/libpcap-0.8.3-6.FC2.3.legacy.i386.rpm dbdcbed104a6d3985a0735aab55031a3be0e1a74 fedora/2/updates/i386/arpwatch-2.1a13-6.FC2.3.legacy.i386.rpm bb98c4cd71507e4dec94da2c1c9f95ee9bbacde1 fedora/2/updates/SRPMS/tcpdump-3.8.2-6.FC2.3.legacy.src.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1267 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1278 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1279 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-1280 9. Contact: The Fedora Legacy security contact is <secnotice@fedoralegacy.org>. More project details at http://www.fedoralegacy.org --------------------------------------------------------------------- --------------enig72CF56A4065A77499C855538 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEMxLYLMAs/0C4zNoRAk8xAJ4utHt2OOExJbd3DH8xtLyfe4YcyACeLsad ZdMzjYDTapqXGKau0WRk570= =BXab -----END PGP SIGNATURE----- --------------enig72CF56A4065A77499C855538-- . ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Apple Airport Probe Response Kernel Memory Corruption Vulnerability SECUNIA ADVISORY ID: SA22679 VERIFY ADVISORY: http://secunia.com/advisories/22679/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: H.D. Moore has reported a vulnerability in the Apple Airport driver, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error in the Airport driver provided with Orinoco-based Airport cards when handling probe response frames. This can be exploited to overwrite kernel memory and potentially execute arbitrary code when the driver is running in active scanning mode. The vulnerability is reported in the driver on a PowerBook running version 10.4.8. Other versions may also be affected. SOLUTION: Do not place the card into active scanning mode. PROVIDED AND/OR DISCOVERED BY: H D Moore ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-01-11-2006.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/tcpdump < 3.8.3-r2 >= 3.8.3-r2 Description =========== TCPDump improperly handles and decodes ISIS, BGP, LDP (CAN-2005-1279) and RSVP (CAN-2005-1280) packets. TCPDump might loop endlessly after receiving malformed packets. Workaround ========== There is no known workaround at this time. Resolution ========== All TCPDump users should upgrade to the latest available version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-3.8.3-r2" References ========== [ 1 ] CAN-2005-1279 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279 [ 2 ] CAN-2005-1280 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200505-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.0

Trust: 5.76

sources: NVD: CVE-2005-1280 // CERT/CC: VU#247744 // CERT/CC: VU#386964 // CERT/CC: VU#191336 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // JVNDB: JVNDB-2005-000283 // BID: 13390 // PACKETSTORM: 45250 // PACKETSTORM: 51595 // PACKETSTORM: 38413

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 3.2

vendor:freebsdmodel: - scope: - version: -

Trust: 3.2

vendor:opensslmodel: - scope: - version: -

Trust: 3.2

vendor:red hatmodel: - scope: - version: -

Trust: 3.2

vendor:ubuntumodel: - scope: - version: -

Trust: 3.2

vendor:f5model: - scope: - version: -

Trust: 2.4

vendor:openpkgmodel: - scope: - version: -

Trust: 2.4

vendor:oraclemodel: - scope: - version: -

Trust: 2.4

vendor:suse linuxmodel: - scope: - version: -

Trust: 2.4

vendor:slackware linuxmodel: - scope: - version: -

Trust: 2.4

vendor:rpathmodel: - scope: - version: -

Trust: 2.4

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:lblmodel:tcpdumpscope:lteversion:3.9.1

Trust: 1.0

vendor:lblmodel:tcpdumpscope:eqversion:3.9.1

Trust: 0.9

vendor:appgate network securitymodel: - scope: - version: -

Trust: 0.8

vendor:attachmatewrqmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:iaik java groupmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:intotomodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:ssh security corpmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:sybasemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:vandykemodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:internet initiativemodel:seil/b1scope:eqversion:2.00 ~ 2.40

Trust: 0.8

vendor:internet initiativemodel:seil/neuscope:eqversion:2fe plus 2.00 ~ 2.02

Trust: 0.8

vendor:internet initiativemodel:seil/turboscope:eqversion:2.00 ~ 2.02

Trust: 0.8

vendor:internet initiativemodel:seil/x1,x2scope:eqversion:2.10 ~ 2.40

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:7

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:8

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.1

Trust: 0.3

vendor:trustixmodel:secure enterprise linuxscope:eqversion:2.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:susemodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:sgimodel:propackscope:eqversion:3.0

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.4

Trust: 0.3

vendor:scomodel:unixware upscope:eqversion:7.1.3

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.3

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:redhatmodel:linux i386scope:eqversion:9.0

Trust: 0.3

vendor:redhatmodel:fedora core3scope: - version: -

Trust: 0.3

vendor:redhatmodel:fedora core2scope: - version: -

Trust: 0.3

vendor:redhatmodel:fedora core1scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:netbsdmodel:currentscope: - version: -

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:4.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:10.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.2

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:10.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake amd64scope:eqversion:10.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.9

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.8.3

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.8.2

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.8.1

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.7.2

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.7.1

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.7

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.6.3

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.6.2

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.5.2

Trust: 0.3

vendor:lblmodel:tcpdump alphascope:eqversion:3.5

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.5

Trust: 0.3

vendor:lblmodel:tcpdump a6scope:eqversion:3.4

Trust: 0.3

vendor:lblmodel:tcpdumpscope:eqversion:3.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.5

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.2

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.12

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.11

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.10

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.9

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.6

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.4

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.0

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.2

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.12

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.11

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.4

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.3

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:modular messagingscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:modular messagingscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:mn100scope: - version: -

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:f5model:big-ipscope:neversion:4.7

Trust: 0.3

vendor:f5model:big-ipscope:neversion:4.5.13

Trust: 0.3

vendor:f5model:3-dnsscope:neversion:4.7

Trust: 0.3

vendor:f5model:3-dnsscope:neversion:4.5.13

Trust: 0.3

sources: CERT/CC: VU#247744 // CERT/CC: VU#386964 // CERT/CC: VU#191336 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // BID: 13390 // CNNVD: CNNVD-200505-090 // JVNDB: JVNDB-2005-000283 // NVD: CVE-2005-1280

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-1280
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#247744
value: 0.28

Trust: 0.8

CARNEGIE MELLON: VU#386964
value: 0.32

Trust: 0.8

CARNEGIE MELLON: VU#191336
value: 0.34

Trust: 0.8

CARNEGIE MELLON: VU#845620
value: 7.56

Trust: 0.8

CARNEGIE MELLON: VU#547300
value: 2.53

Trust: 0.8

NVD: CVE-2005-1280
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200505-090
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2005-1280
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#247744 // CERT/CC: VU#386964 // CERT/CC: VU#191336 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // CNNVD: CNNVD-200505-090 // JVNDB: JVNDB-2005-000283 // NVD: CVE-2005-1280

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-1280

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200505-090

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200505-090

CONFIGURATIONS

sources: JVNDB: JVNDB-2005-000283

PATCH

title:257url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=257

Trust: 0.8

title:156040url:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156040

Trust: 0.8

title:RHSA-2005:421url:https://rhn.redhat.com/errata/RHSA-2005-421.html

Trust: 0.8

title:RHSA-2005:417url:https://rhn.redhat.com/errata/RHSA-2005-417.html

Trust: 0.8

title:tcpdump コマンド実行時における脆弱性url:http://www.seil.jp/seilseries/security/2009/07061763.php

Trust: 0.8

title:TLSA-2005-63url:http://www.turbolinux.com/security/2005/TLSA-2005-63.txt

Trust: 0.8

title:RHSA-2005:417url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-417J.html

Trust: 0.8

title:RHSA-2005:421url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-421J.html

Trust: 0.8

title:TLSA-2005-63url:http://www.turbolinux.co.jp/security/2005/TLSA-2005-63j.txt

Trust: 0.8

sources: JVNDB: JVNDB-2005-000283

EXTERNAL IDS

db:NVDid:CVE-2005-1280

Trust: 2.9

db:BIDid:13390

Trust: 2.7

db:SECUNIAid:23280

Trust: 2.4

db:SECUNIAid:23309

Trust: 2.4

db:BIDid:22083

Trust: 2.4

db:SECUNIAid:15125

Trust: 2.4

db:SECUNIAid:22259

Trust: 1.6

db:SECUNIAid:23155

Trust: 1.6

db:SECUNIAid:22094

Trust: 1.6

db:SECUNIAid:18146

Trust: 1.6

db:SECUNIAid:22679

Trust: 0.9

db:SECUNIAid:23340

Trust: 0.8

db:SECUNIAid:22671

Trust: 0.8

db:SECUNIAid:23351

Trust: 0.8

db:SECUNIAid:22385

Trust: 0.8

db:SECUNIAid:23131

Trust: 0.8

db:SECUNIAid:22544

Trust: 0.8

db:CERT/CCid:VU#247744

Trust: 0.8

db:BIDid:20246

Trust: 0.8

db:CERT/CCid:VU#386964

Trust: 0.8

db:CERT/CCid:VU#191336

Trust: 0.8

db:SECUNIAid:21709

Trust: 0.8

db:CERT/CCid:VU#845620

Trust: 0.8

db:SECUNIAid:22207

Trust: 0.8

db:SECUNIAid:22212

Trust: 0.8

db:SECUNIAid:22116

Trust: 0.8

db:SECUNIAid:22216

Trust: 0.8

db:SECUNIAid:22220

Trust: 0.8

db:SECUNIAid:22330

Trust: 0.8

db:SECUNIAid:22130

Trust: 0.8

db:SECUNIAid:22240

Trust: 0.8

db:SECUNIAid:22260

Trust: 0.8

db:SECUNIAid:22165

Trust: 0.8

db:SECUNIAid:22166

Trust: 0.8

db:SECUNIAid:22172

Trust: 0.8

db:SECUNIAid:22284

Trust: 0.8

db:SECUNIAid:22186

Trust: 0.8

db:SECUNIAid:22193

Trust: 0.8

db:BIDid:20249

Trust: 0.8

db:SECTRACKid:1016943

Trust: 0.8

db:XFid:29237

Trust: 0.8

db:CERT/CCid:VU#547300

Trust: 0.8

db:BIDid:13380

Trust: 0.8

db:BIDid:13389

Trust: 0.8

db:BIDid:13392

Trust: 0.8

db:JVNDBid:JVNDB-2005-000283

Trust: 0.8

db:FEDORAid:FLSA:156139

Trust: 0.6

db:BUGTRAQid:20050426 TCPDUMP(/ETHEREAL)[]: (RSVP) RSVP_PRINT() INFINITE LOOP DOS.

Trust: 0.6

db:REDHATid:RHSA-2005:417

Trust: 0.6

db:REDHATid:RHSA-2005:421

Trust: 0.6

db:SCOid:SCOSA-2005.60

Trust: 0.6

db:CNNVDid:CNNVD-200505-090

Trust: 0.6

db:PACKETSTORMid:45250

Trust: 0.1

db:PACKETSTORMid:51595

Trust: 0.1

db:PACKETSTORMid:38413

Trust: 0.1

sources: CERT/CC: VU#247744 // CERT/CC: VU#386964 // CERT/CC: VU#191336 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // BID: 13390 // PACKETSTORM: 45250 // PACKETSTORM: 51595 // PACKETSTORM: 38413 // CNNVD: CNNVD-200505-090 // JVNDB: JVNDB-2005-000283 // NVD: CVE-2005-1280

REFERENCES

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 2.4

url:http://secunia.com/advisories/23280/

Trust: 2.4

url:http://secunia.com/advisories/23309/

Trust: 2.4

url:http://www.securityfocus.com/bid/22083

Trust: 2.4

url:http://www.securityfocus.com/bid/13390

Trust: 2.4

url:http://secunia.com/advisories/15125

Trust: 2.4

url:http://secunia.com/advisories/23155/

Trust: 1.6

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1

Trust: 1.6

url:http://www.securityfocus.com/archive/1/396930

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2005-421.html

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2005-417.html

Trust: 1.6

url:http://secunia.com/advisories/18146

Trust: 1.6

url:ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.60/scosa-2005.60.txt

Trust: 1.6

url:http://www.securityfocus.com/archive/1/430292/100/0/threaded

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10732

Trust: 1.0

url:http://secunia.com/advisories/22679/

Trust: 0.9

url:http://projects.info-pull.com/mokb/mokb-01-11-2006.html

Trust: 0.9

url:http://www.openssl.org/

Trust: 0.8

url:http://secunia.com/advisories/23131/

Trust: 0.8

url:http://secunia.com/advisories/22544/

Trust: 0.8

url:http://secunia.com/advisories/22385/

Trust: 0.8

url:http://secunia.com/advisories/22671/

Trust: 0.8

url:http://secunia.com/advisories/23340/

Trust: 0.8

url:http://secunia.com/advisories/22094/

Trust: 0.8

url:http://secunia.com/advisories/22259/

Trust: 0.8

url:http://www.f-secure.com/security/fsc-2006-6.shtml

Trust: 0.8

url:http://secunia.com/advisories/23351/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23386964/index.html

Trust: 0.8

url:http://www.securityfocus.com/bid/20246

Trust: 0.8

url:http://docs.info.apple.com/article.html?artnum=304829

Trust: 0.8

url:http://standards.ieee.org/announcements/pr_frames.html

Trust: 0.8

url:http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Trust: 0.8

url:http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

url:http://secunia.com/advisories/21709/

Trust: 0.8

url:http://www.rsasecurity.com/rsalabs/node.asp?id=2125

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3447.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23547300/index.html

Trust: 0.8

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html

Trust: 0.8

url:https://issues.rpath.com/browse/rpl-613

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 0.8

url:http://kolab.org/security/kolab-vendor-notice-11.txt

Trust: 0.8

url:http://openvpn.net/changelog.html

Trust: 0.8

url:http://www.serv-u.com/releasenotes/

Trust: 0.8

url:http://openbsd.org/errata.html#openssl2

Trust: 0.8

url:http://www.securityfocus.com/bid/20249

Trust: 0.8

url:http://securitytracker.com/id?1016943

Trust: 0.8

url:http://secunia.com/advisories/22130

Trust: 0.8

url:http://secunia.com/advisories/22094

Trust: 0.8

url:http://secunia.com/advisories/22165

Trust: 0.8

url:http://secunia.com/advisories/22186

Trust: 0.8

url:http://secunia.com/advisories/22193

Trust: 0.8

url:http://secunia.com/advisories/22207

Trust: 0.8

url:http://secunia.com/advisories/22259

Trust: 0.8

url:http://secunia.com/advisories/22260

Trust: 0.8

url:http://secunia.com/advisories/22166

Trust: 0.8

url:http://secunia.com/advisories/22172

Trust: 0.8

url:http://secunia.com/advisories/22212

Trust: 0.8

url:http://secunia.com/advisories/22240

Trust: 0.8

url:http://secunia.com/advisories/22216

Trust: 0.8

url:http://secunia.com/advisories/22116

Trust: 0.8

url:http://secunia.com/advisories/22220

Trust: 0.8

url:http://secunia.com/advisories/22284

Trust: 0.8

url:http://secunia.com/advisories/22330

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/29237

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-1280

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-1280

Trust: 0.8

url:http://www.securityfocus.com/bid/13392

Trust: 0.8

url:http://www.securityfocus.com/bid/13389

Trust: 0.8

url:http://www.securityfocus.com/bid/13380

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/430292/100/0/threaded

Trust: 0.6

url:http://support.avaya.com/elmodocs2/security/asa-2005-137_rhsa-2005-417_rhsa-2005-421.pdf

Trust: 0.3

url:http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=21&mode=thread&order=0&thold=0

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2005-417.html

Trust: 0.3

url:http://tech.f5.com/home/bigip/solutions/advisories/sol4809.html

Trust: 0.3

url:http://www.tcpdump.org/

Trust: 0.3

url:/archive/1/396930

Trust: 0.3

url:/archive/1/396932

Trust: 0.3

url:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3d156139

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/i386/libpcap-0.7.2-7.9.=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/i386/libpcap-0.8.3-6.fc=

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/srpms/tcpdump-3.7.2-7.9=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/i386/tcpdump-3.8.2-6.fc=

Trust: 0.1

url:http://www.fedoralegacy.org/about/security.php

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1267

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/i386/libpcap-0.7.2-8.fc=

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1278

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/srpms/tcpdump-3.7.2-8.f=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/i386/arpwatch-2.1a13-6.=

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/i386/arpwatch-2.1a11-8.=

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/i386/arpwatch-2.1a11-7.=

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1280

Trust: 0.1

url:http://www.fedoralegacy.org

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2005-1279

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/2/updates/srpms/tcpdump-3.8.2-6.f=

Trust: 0.1

url:http://www.fedoralegacy.org/docs

Trust: 0.1

url:http://download.fedoralegacy.org/fedora/1/updates/i386/tcpdump-3.7.2-8.fc=

Trust: 0.1

url:http://download.fedoralegacy.org/redhat/9/updates/i386/tcpdump-3.7.2-7.9.=

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-1280

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1279

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-1279

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-1280

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200505-06.xml

Trust: 0.1

sources: CERT/CC: VU#247744 // CERT/CC: VU#386964 // CERT/CC: VU#191336 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // BID: 13390 // PACKETSTORM: 45250 // PACKETSTORM: 51595 // PACKETSTORM: 38413 // CNNVD: CNNVD-200505-090 // JVNDB: JVNDB-2005-000283 // NVD: CVE-2005-1280

CREDITS

Vade 79 v9@fakehalo.deadpig.org

Trust: 0.6

sources: CNNVD: CNNVD-200505-090

SOURCES

db:CERT/CCid:VU#247744
db:CERT/CCid:VU#386964
db:CERT/CCid:VU#191336
db:CERT/CCid:VU#845620
db:CERT/CCid:VU#547300
db:BIDid:13390
db:PACKETSTORMid:45250
db:PACKETSTORMid:51595
db:PACKETSTORMid:38413
db:CNNVDid:CNNVD-200505-090
db:JVNDBid:JVNDB-2005-000283
db:NVDid:CVE-2005-1280

LAST UPDATE DATE

2025-09-28T22:36:38.503000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#247744date:2007-02-09T00:00:00
db:CERT/CCid:VU#386964date:2011-07-22T00:00:00
db:CERT/CCid:VU#191336date:2006-11-30T00:00:00
db:CERT/CCid:VU#845620date:2007-02-08T00:00:00
db:CERT/CCid:VU#547300date:2011-07-22T00:00:00
db:BIDid:13390date:2009-06-23T19:19:00
db:CNNVDid:CNNVD-200505-090date:2005-10-20T00:00:00
db:JVNDBid:JVNDB-2005-000283date:2009-08-10T00:00:00
db:NVDid:CVE-2005-1280date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#247744date:2006-09-28T00:00:00
db:CERT/CCid:VU#386964date:2006-09-28T00:00:00
db:CERT/CCid:VU#191336date:2006-11-30T00:00:00
db:CERT/CCid:VU#845620date:2006-09-11T00:00:00
db:CERT/CCid:VU#547300date:2006-09-28T00:00:00
db:BIDid:13390date:2005-04-26T00:00:00
db:PACKETSTORMid:45250date:2006-04-06T22:26:29
db:PACKETSTORMid:51595date:2006-11-03T00:05:01
db:PACKETSTORMid:38413date:2005-07-02T00:59:37
db:CNNVDid:CNNVD-200505-090date:2005-04-27T00:00:00
db:JVNDBid:JVNDB-2005-000283date:2007-04-01T00:00:00
db:NVDid:CVE-2005-1280date:2005-05-02T04:00:00