9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.575 Medium
EPSS
Percentile
97.7%
The Quagga BGP daemon bgpd prior to version 1.2.3 may be vulnerable to multiple issues that may result in denial of service, information disclosure, or remote code execution.
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer - CVE-2018-5378 (Quagga-2018-0543)
The Quagga BGP daemon, bgpd, does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or it may crash.
CWE-415: Double Free - CVE-2018-5379 (Quagga-2018-1114)
The Quagga BGP daemon, bgpd, can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes.
CWE-125: Out-of-bounds Read - CVE-2018-5380 (Quagga-2018-1550)
The Quagga BGP daemon, bgpd, can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.
CWE-228: Improper Handling of Syntactically Invalid Structure - CVE-2018-5381 (Quagga-2018-1975)
The Quagga BGP daemon, bgpd, had a bug in its parsing of “Capabilities” in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI.
For more information, please see Quagga’s version 1.2.3 release announcement.
The CVSS score below is based on CVE-2018-5379.
An unauthenticated, remote attacker may be able to use crafted input to result in a crash of bgpd or even allow a remote attacker to gain control of an affected bgpd process.
Apply an update
Quagga has released bgpd version 1.2.3 to address these issues. Affected users should apply an update as soon as possible.
940439
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: February 06, 2018 Updated: February 15, 2018
Statement Date: February 15, 2018
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 06, 2018 Updated: February 19, 2018
Statement Date: February 16, 2018
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 06, 2018 Updated: February 19, 2018
Statement Date: February 16, 2018
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 06, 2018 Updated: February 07, 2018
Statement Date: February 07, 2018
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 15, 2018 Updated: February 15, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 15, 2018 Updated: February 15, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 15, 2018 Updated: February 15, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 15, 2018 Updated: February 15, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 08, 2018 Updated: February 08, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 15, 2018 Updated: February 15, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 09, 2018 Updated: February 09, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 15, 2018 Updated: February 15, 2018
Unknown
We have not received a statement from the vendor.
Notified: February 06, 2018 Updated: February 06, 2018
Unknown
We have not received a statement from the vendor.
View all 23 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 7.3 | E:POC/RL:OF/RC:C |
Environmental | 7.3 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
The Quagga developers thank Alban Browaeys, Balaji Gurudoss, Borg, Scott Leggett and Debian QA Group, Eugene Bogomazov, Evgeny Uskov, Gerrie Roos, Mathieu Jadin, Pier Carlo Chiodi, and Rolf Eike Beer.
This document was written by Garret Wassermann.
CVE IDs: | CVE-2018-5378, CVE-2018-5379, CVE-2018-5380, CVE-2018-5381 |
---|---|
Date Public: | 2018-02-15 Date First Published: |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.575 Medium
EPSS
Percentile
97.7%