2.6 Low
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:N/I:N/A:P
quagga is vulnerable to denial of service (DoS) attacks. The vulnerability exists as a stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
CPE | Name | Operator | Version |
---|---|---|---|
quagga | eq | 0.99.15__5.el6_0.2 | |
quagga | eq | 0.99.15__7.el6_3.2 | |
quagga | eq | 0.99.15__5.el6_0.1 | |
quagga | eq | 0.99.15__5.el6 |
git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
lists.quagga.net/pipermail/quagga-dev/2013-July/010622.html
nongnu.mirrors.hostinginnederland.nl//quagga/quagga-0.99.22.3.changelog.txt
rhn.redhat.com/errata/RHSA-2017-0794.html
seclists.org/oss-sec/2013/q3/24
www.debian.org/security/2013/dsa-2803
www.securityfocus.com/bid/60955
www.ubuntu.com/usn/USN-2941-1
access.redhat.com/errata/RHSA-2017:0794
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=674862
bugzilla.redhat.com/show_bug.cgi?id=770731
bugzilla.redhat.com/show_bug.cgi?id=839620
bugzilla.redhat.com/show_bug.cgi?id=842308
bugzilla.redhat.com/show_bug.cgi?id=862826