The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation20 reference(s) from NVD