[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2459-1 quagga -- several

ID: oval:org.secpod.oval:def:600788Date: (C)2012-04-27   (M)2022-10-10
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in Quagga, a routing daemon. CVE-2012-0249 A buffer overflow in the ospf_ls_upd_list_lsa function in the OSPFv2 implementation allows remote attackers to cause a denial of service via a Link State Update packet that is smaller than the length specified in its header. CVE-2012-0250 A buffer overflow in the OSPFv2 implementation allows remote attackers to cause a denial of service via a Link State Update packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field. CVE-2012-0255 The BGP implementation does not properly use message buffers for OPEN messages, which allows remote attackers impersonating a configured BGP peer to cause a denial of service via a message associated with a malformed AS4 capability. This security update upgrades the quagga package to the most recent upstream release. This release includes other corrections, such as hardening against unknown BGP path attributes.

Platform:
Debian 6.0
Product:
quagga
Reference:
DSA-2459-1
CVE-2012-0249
CVE-2012-0250
CVE-2012-0255
CVE    3
CVE-2012-0249
CVE-2012-0255
CVE-2012-0250
CPE    42
cpe:/a:quagga:quagga:0.99.15
cpe:/a:quagga:quagga:0.99.16
cpe:/a:quagga:quagga:0.99.13
cpe:/a:quagga:quagga:0.99.14
...

© SecPod Technologies