logo
DATABASE RESOURCES PRICING ABOUT US

Scientific Linux Security Update : quagga on SL6.x i386/x86_64

Description

A stack-based buffer overflow flaw was found in the way the Quagga bgpd daemon processed certain BGP Route Refresh (RR) messages. A configured BGP peer could send a specially crafted BGP message, causing bgpd on a target system to crash or, possibly, execute arbitrary code with the privileges of the user running bgpd. (CVE-2010-2948) Note: On Scientific Linux 6 it is not possible to exploit CVE-2010-2948 to run arbitrary code as the overflow is blocked by FORTIFY_SOURCE. A NULL pointer dereference flaw was found in the way the Quagga bgpd daemon parsed the paths of autonomous systems (AS). A configured BGP peer could crash bgpd on a target system via a specially crafted BGP message. (CVE-2010-2949) After installing the updated packages, the bgpd daemon must be restarted for the update to take effect.


Related