[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2104-1 quagga -- several

ID: oval:org.secpod.oval:def:600079Date: (C)2011-01-28   (M)2023-02-20
Class: PATCHFamily: unix




Several remote vulnerabilities have been discovered in the BGP implementation of Quagga, a routing daemon. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-2948 When processing a crafted Route Refresh message received from a configured, authenticated BGP neighbor, Quagga may crash, leading to a denial of service. CVE-2010-2949 When processing certain crafted AS paths, Quagga would crash with a NULL pointer dereference, leading to a denial of service. In some configurations, such crafted AS paths could be relayed by intermediate BGP routers. In addition, this update contains a reliability fix: Quagga will no longer advertise confederation-related AS paths to non-confederation peers, and reject unexpected confederation-related AS paths by resetting the session with the BGP peer which is advertising them. For the stable distribution , these problems have been fixed in version 0.99.10-1lenny3. For the unstable distribution and the testing distribution , these problems have been fixed in version 0.99.17-1. We recommend that you upgrade your quagga package.

Platform:
Debian 5.0
Product:
quagga
Reference:
DSA-2104-1
CVE-2010-2948
CVE-2010-2949
CVE    2
CVE-2010-2949
CVE-2010-2948
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies