Lucene search

K
amazonAmazonALAS-2012-070
HistoryApr 30, 2012 - 2:55 p.m.

Medium: quagga

2012-04-3014:55:00
alas.aws.amazon.com
14

3.3 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

0.023 Low

EPSS

Percentile

89.8%

Issue Overview:

Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.

Affected Packages:

quagga

Issue Correction:
Run yum update quagga to update your system.

New Packages:

i686:  
    quagga-contrib-0.99.20.1-1.4.amzn1.i686  
    quagga-0.99.20.1-1.4.amzn1.i686  
    quagga-devel-0.99.20.1-1.4.amzn1.i686  
    quagga-debuginfo-0.99.20.1-1.4.amzn1.i686  
  
src:  
    quagga-0.99.20.1-1.4.amzn1.src  
  
x86_64:  
    quagga-contrib-0.99.20.1-1.4.amzn1.x86_64  
    quagga-devel-0.99.20.1-1.4.amzn1.x86_64  
    quagga-0.99.20.1-1.4.amzn1.x86_64  
    quagga-debuginfo-0.99.20.1-1.4.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-0250

Mitre: CVE-2012-0250

3.3 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

0.023 Low

EPSS

Percentile

89.8%