[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2316-1 quagga -- several

ID: oval:org.secpod.oval:def:600632Date: (C)2012-01-30   (M)2023-11-09
Class: PATCHFamily: unix




Riku Hietamaki, Tuomo Untinen and Jukka Taimisto discovered several vulnerabilities in Quagga, an Internet routing daemon: CVE-2011-3323 A stack-based buffer overflow while decoding Link State Update packets with a malformed Inter Area Prefix LSA can cause the ospf6d process to crash or execute arbitrary code. CVE-2011-3324 The ospf6d process can crash while processing a Database Description packet with a crafted Link-State-Advertisement. CVE-2011-3325 The ospfd process can crash while processing a crafted Hello packet. CVE-2011-3326 The ospfd process crashes while processing Link-State-Advertisements of a type not known to Quagga. CVE-2011-3327 A heap-based buffer overflow while processing BGP UPDATE messages containing an Extended Communities path attribute can cause the bgpd process to crash or execute arbitrary code. The OSPF-related vulnerabilities require that potential attackers send packets to a vulnerable Quagga router; the packets are not distributed over OSPF. In contrast, the BGP UPDATE messages could be propagated by some routers.

Platform:
Debian 5.0
Debian 6.0
Product:
quagga
Reference:
DSA-2316-1
CVE-2011-3323
CVE-2011-3324
CVE-2011-3325
CVE-2011-3326
CVE-2011-3327
CVE    5
CVE-2011-3326
CVE-2011-3327
CVE-2011-3323
CVE-2011-3324
...
CPE    41
cpe:/a:quagga:quagga:0.99.15
cpe:/a:quagga:quagga:0.99.16
cpe:/a:quagga:quagga:0.99.13
cpe:/a:quagga:quagga:0.99.14
...

© SecPod Technologies