Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2018-5381
HistoryFeb 19, 2018 - 1:29 p.m.

CVE-2018-5381

2018-02-1913:29:00
Debian Security Bug Tracker
security-tracker.debian.org
18
quagga bgp bgpd
version 1.2.3
parsing bug
capabilities
bgp open messages
denial of service
infinite loop
multi-protocol
afi/safi
unix

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.122

Percentile

95.4%

The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of “Capabilities” in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.

OSVersionArchitecturePackageVersionFilename
Debian10allquagga< 1.2.4-1quagga_1.2.4-1_all.deb

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.122

Percentile

95.4%