Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-5495
HistoryJan 24, 2017 - 12:00 a.m.

CVE-2017-5495

2017-01-2400:00:00
ubuntu.com
ubuntu.com
10

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.268 Low

EPSS

Percentile

96.7%

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded
memory allocation in the telnet ‘vty’ CLI, leading to a Denial-of-Service
of Quagga daemons, or even the entire host. When Quagga daemons are
configured with their telnet CLI enabled, anyone who can connect to the TCP
ports can trigger this vulnerability, prior to authentication. Most
distributions restrict the Quagga telnet interface to local access only by
default. The Quagga telnet interface ‘vty’ input buffer grows
automatically, without bound, so long as a newline is not entered. This
allows an attacker to cause the Quagga daemon to allocate unbounded memory
by sending very long strings without a newline. Eventually the daemon is
terminated by the system, or the system itself runs out of memory. This is
fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite
2017-01-10.

Bugs

Notes

Author Note
tyhicks The telnet ‘vty’ CLI is not configured to listen for remote connections by default
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchquagga< 0.99.22.4-3ubuntu1.4UNKNOWN
ubuntu16.04noarchquagga< 0.99.24.1-2ubuntu1.3UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.268 Low

EPSS

Percentile

96.7%