CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
97.7%
Debian Security Advisory DSA-4115-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
February 15, 2018 https://www.debian.org/security/faq
Package : quagga
CVE ID : CVE-2018-5378 CVE-2018-5379 CVE-2018-5380 CVE-2018-5381
Several vulnerabilities have been discovered in Quagga, a routing
daemon. The Common Vulnerabilities and Exposures project identifies the
following issues:
CVE-2018-5378
It was discovered that the Quagga BGP daemon, bgpd, does not
properly bounds check data sent with a NOTIFY to a peer, if an
attribute length is invalid. A configured BGP peer can take
advantage of this bug to read memory from the bgpd process or cause
a denial of service (daemon crash).
https://www.quagga.net/security/Quagga-2018-0543.txt
CVE-2018-5379
It was discovered that the Quagga BGP daemon, bgpd, can double-free
memory when processing certain forms of UPDATE message, containing
cluster-list and/or unknown attributes, resulting in a denial of
service (bgpd daemon crash).
https://www.quagga.net/security/Quagga-2018-1114.txt
CVE-2018-5380
It was discovered that the Quagga BGP daemon, bgpd, does not
properly handle internal BGP code-to-string conversion tables.
https://www.quagga.net/security/Quagga-2018-1550.txt
CVE-2018-5381
It was discovered that the Quagga BGP daemon, bgpd, can enter an
infinite loop if sent an invalid OPEN message by a configured peer.
A configured peer can take advantage of this flaw to cause a denial
of service (bgpd daemon not responding to any other events; BGP
sessions will drop and not be reestablished; unresponsive CLI
interface).
https://www.quagga.net/security/Quagga-2018-1975.txt
For the oldstable distribution (jessie), these problems have been fixed
in version 0.99.23.1-1+deb8u5.
For the stable distribution (stretch), these problems have been fixed in
version 1.1.1-3+deb9u2.
We recommend that you upgrade your quagga packages.
For the detailed security status of quagga please refer to its security
tracker page at: https://security-tracker.debian.org/tracker/quagga
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 7 | armel | quagga-dbg | < 0.99.22.4-1+wheezy3+deb7u3 | quagga-dbg_0.99.22.4-1+wheezy3+deb7u3_armel.deb |
Debian | 9 | armel | quagga-isisd-dbgsym | < 1.1.1-3+deb9u2 | quagga-isisd-dbgsym_1.1.1-3+deb9u2_armel.deb |
Debian | 9 | arm64 | quagga-isisd | < 1.1.1-3+deb9u2 | quagga-isisd_1.1.1-3+deb9u2_arm64.deb |
Debian | 9 | mips64el | quagga-ospfd | < 1.1.1-3+deb9u2 | quagga-ospfd_1.1.1-3+deb9u2_mips64el.deb |
Debian | 9 | armhf | quagga-ripd-dbgsym | < 1.1.1-3+deb9u2 | quagga-ripd-dbgsym_1.1.1-3+deb9u2_armhf.deb |
Debian | 8 | ppc64el | quagga-dbg | < 0.99.23.1-1+deb8u5 | quagga-dbg_0.99.23.1-1+deb8u5_ppc64el.deb |
Debian | 9 | armel | quagga-ripd-dbgsym | < 1.1.1-3+deb9u2 | quagga-ripd-dbgsym_1.1.1-3+deb9u2_armel.deb |
Debian | 9 | armel | quagga-core | < 1.1.1-3+deb9u2 | quagga-core_1.1.1-3+deb9u2_armel.deb |
Debian | 9 | ppc64el | quagga-ospfd-dbgsym | < 1.1.1-3+deb9u2 | quagga-ospfd-dbgsym_1.1.1-3+deb9u2_ppc64el.deb |
Debian | 7 | all | quagga-doc | < 0.99.22.4-1+wheezy3+deb7u3 | quagga-doc_0.99.22.4-1+wheezy3+deb7u3_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
97.7%