[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2197-1 quagga -- denial of service

ID: oval:org.secpod.oval:def:600552Date: (C)2011-07-05   (M)2022-10-10
Class: PATCHFamily: unix




It has been discovered that the Quagga routing daemon contains two denial-of-service vulnerabilities in its BGP implementation: CVE-2010-1674 A crafted Extended Communities attribute triggers a null pointer dereference which causes the BGP daemon to crash. The crafted attributes are not propagated by the Internet core, so only explicitly configured direct peers are able to exploit this vulnerability in typical configurations. CVE-2010-1675 The BGP daemon resets BGP sessions when it encounters malformed AS_PATHLIMIT attributes, introducing a distributed BGP session reset vulnerability which disrupts packet forwarding. Such malformed attributes are propagated by the Internet core, and exploitation of this vulnerability is not restricted to directly configured BGP peers. This security update removes AS_PATHLIMIT processing from the BGP implementation, preserving the configuration statements for backwards compatibility

Platform:
Debian 5.0
Debian 6.0
Product:
quagga
Reference:
DSA-2197-1
CVE-2010-1674
CVE-2010-1675
CVE    2
CVE-2010-1674
CVE-2010-1675
CPE    40
cpe:/a:quagga:quagga:0.99.15
cpe:/a:quagga:quagga:0.99.16
cpe:/a:quagga:quagga:0.99.13
cpe:/a:quagga:quagga:0.99.14
...

© SecPod Technologies