[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4115-1 quagga -- quagga

ID: oval:org.secpod.oval:def:603272Date: (C)2018-02-28   (M)2023-12-20
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in Quagga, a routing daemon. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2018-5378 It was discovered that the Quagga BGP daemon, bgpd, does not properly bounds check data sent with a NOTIFY to a peer, if an attribute length is invalid. A configured BGP peer can take advantage of this bug to read memory from the bgpd process or cause a denial of service . https://www.quagga.net/security/Quagga-2018-0543.txt CVE-2018-5379 It was discovered that the Quagga BGP daemon, bgpd, can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes, resulting in a denial of service . https://www.quagga.net/security/Quagga-2018-1114.txt CVE-2018-5380 It was discovered that the Quagga BGP daemon, bgpd, does not properly handle internal BGP code-to-string conversion tables. https://www.quagga.net/security/Quagga-2018-1550.txt CVE-2018-5381 It was discovered that the Quagga BGP daemon, bgpd, can enter an infinite loop if sent an invalid OPEN message by a configured peer. A configured peer can take advantage of this flaw to cause a denial of service . https://www.quagga.net/security/Quagga-2018-1975.txt

Platform:
Debian 8.x
Debian 9.x
Product:
quagga
Reference:
DSA-4115-1
CVE-2018-5378
CVE-2018-5379
CVE-2018-5380
CVE-2018-5381
CVE    4
CVE-2018-5379
CVE-2018-5378
CVE-2018-5381
CVE-2018-5380
...
CPE    6
cpe:/o:debian:debian_linux:9.0
cpe:/a:quagga:quagga
cpe:/o:debian:debian_linux:8.x
cpe:/o:debian:debian_linux:9.x
...

© SecPod Technologies