[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3532-1 quagga -- quagga

ID: oval:org.secpod.oval:def:602438Date: (C)2016-03-29   (M)2023-11-10
Class: PATCHFamily: unix




Kostya Kortchinsky discovered a stack-based buffer overflow vulnerability in the VPNv4 NLRI parser in bgpd in quagga, a BGP/OSPF/RIP routing daemon. A remote attacker can exploit this flaw to cause a denial of service , or potentially, execution of arbitrary code, if bgpd is configured with BGP peers enabled for VPNv4.

Platform:
Debian 8.x
Debian 7.x
Product:
quagga
Reference:
DSA-3532-1
CVE-2016-2342
CVE    1
CVE-2016-2342
CPE    3
cpe:/a:quagga:quagga
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies