Summary
Detail | |||
---|---|---|---|
Vendor | Quagga | First view | 2006-05-05 |
Product | Quagga | Last view | 2021-11-19 |
Version | 0.98.5 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:quagga:quagga |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2021-11-19 | CVE-2021-44038 | An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update. |
7.5 | 2018-02-19 | CVE-2018-5381 | The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service. |
4.3 | 2018-02-19 | CVE-2018-5380 | The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input. |
9.8 | 2018-02-19 | CVE-2018-5379 | The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code. |
5.9 | 2018-02-19 | CVE-2018-5378 | The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash. |
7.5 | 2017-10-29 | CVE-2017-16227 | The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message. |
9.8 | 2017-02-22 | CVE-2016-1245 | It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent. |
7.5 | 2017-01-24 | CVE-2017-5495 | All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10. |
2.6 | 2013-10-23 | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. |
2.9 | 2012-06-13 | CVE-2012-1820 | The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message. |
5 | 2012-04-05 | CVE-2012-0255 | The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability). |
3.3 | 2012-04-05 | CVE-2012-0250 | Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field. |
3.3 | 2012-04-05 | CVE-2012-0249 | Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header. |
7.5 | 2011-10-10 | CVE-2011-3327 | Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4. |
5 | 2011-10-10 | CVE-2011-3326 | The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message. |
5 | 2011-10-10 | CVE-2011-3325 | ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet. |
5 | 2011-10-10 | CVE-2011-3324 | The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message. |
5 | 2011-10-10 | CVE-2011-3323 | The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length. |
5 | 2011-03-29 | CVE-2010-1675 | bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute. |
5 | 2011-03-29 | CVE-2010-1674 | The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute. |
5 | 2010-09-10 | CVE-2010-2949 | bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message. |
6.5 | 2010-09-10 | CVE-2010-2948 | Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message. |
5 | 2009-05-06 | CVE-2009-1572 | The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error. |
3.5 | 2007-09-12 | CVE-2007-4826 | bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled. |
6.3 | 2007-04-12 | CVE-2007-1995 | bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
47% (10) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
23% (5) | CWE-399 | Resource Management Errors |
14% (3) | CWE-20 | Improper Input Validation |
4% (1) | CWE-415 | Double Free |
4% (1) | CWE-125 | Out-of-bounds Read |
4% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
75732 | Quagga bgpd IPv4 AS_PATH UPDATE Message Parsing Overflow |
75731 | Quagga ospfd Link State Advertisement (LSA) Link State Update Message Parsing... |
75730 | Quagga ospfd Hello Message Parsing Remote IPv4 DoS |
75729 | Quagga ospf6d Database Description Message Parsing Remote IPv6 DoS |
75728 | Quagga ospf6d Linkstate Message Parsing Remote IPv6 DoS |
71259 | Quagga Extended Communities Attribute Handling NULL Dereference Remote DoS |
71258 | Quagga AS_PATHLIMIT BGP Session Reset Remote DoS |
67404 | Quagga bgpd AS Path Parsing NULL Dereference DoS |
67394 | Quagga bgp_packet.c bgp_route_refresh_receive Function Route-Refresh Message ... |
54200 | Quagga bgpd/bgp_aspath.c bgpd Service 4-byte ASN Data Handling Remote DoS |
40494 | Quagga bgpd Malformed COMMUNITY Attribute Handling DoS |
40493 | Quagga bgpd Malformed OPEN Message Handling DoS |
34812 | Quagga bgpd/bgp_attr.c Crafted UPDATE Message DoS |
25245 | Quagga bgpd Telnet Interface Local DoS |
25224 | Quagga RIPd RIPv1 Request Routing Table Disclosure |
OpenVAS Exploits
id | Description |
---|---|
2012-10-12 | Name : Ubuntu Update for quagga USN-1605-1 File : nvt/gb_ubuntu_USN_1605_1.nasl |
2012-09-17 | Name : RedHat Update for quagga RHSA-2012:1258-01 File : nvt/gb_RHSA-2012_1258-01_quagga.nasl |
2012-09-17 | Name : CentOS Update for quagga CESA-2012:1259 centos6 File : nvt/gb_CESA-2012_1259_quagga_centos6.nasl |
2012-09-17 | Name : CentOS Update for quagga CESA-2012:1258 centos5 File : nvt/gb_CESA-2012_1258_quagga_centos5.nasl |
2012-09-17 | Name : RedHat Update for quagga RHSA-2012:1259-01 File : nvt/gb_RHSA-2012_1259-01_quagga.nasl |
2012-08-30 | Name : Fedora Update for quagga FEDORA-2012-9103 File : nvt/gb_fedora_2012_9103_quagga_fc17.nasl |
2012-08-30 | Name : Fedora Update for quagga FEDORA-2012-5352 File : nvt/gb_fedora_2012_5352_quagga_fc17.nasl |
2012-08-10 | Name : Debian Security Advisory DSA 2497-1 (quagga) File : nvt/deb_2497_1.nasl |
2012-08-10 | Name : FreeBSD Ports: quagga File : nvt/freebsd_quagga4.nasl |
2012-06-22 | Name : Fedora Update for quagga FEDORA-2012-9117 File : nvt/gb_fedora_2012_9117_quagga_fc15.nasl |
2012-06-22 | Name : Fedora Update for quagga FEDORA-2012-9116 File : nvt/gb_fedora_2012_9116_quagga_fc16.nasl |
2012-06-06 | Name : RedHat Update for quagga RHSA-2011:0406-01 File : nvt/gb_RHSA-2011_0406-01_quagga.nasl |
2012-05-17 | Name : Ubuntu Update for quagga USN-1441-1 File : nvt/gb_ubuntu_USN_1441_1.nasl |
2012-04-30 | Name : FreeBSD Ports: quagga File : nvt/freebsd_quagga3.nasl |
2012-04-30 | Name : Debian Security Advisory DSA 2459-1 (quagga) File : nvt/deb_2459_1.nasl |
2012-04-23 | Name : Fedora Update for quagga FEDORA-2012-5411 File : nvt/gb_fedora_2012_5411_quagga_fc16.nasl |
2012-04-23 | Name : Fedora Update for quagga FEDORA-2012-5436 File : nvt/gb_fedora_2012_5436_quagga_fc15.nasl |
2012-03-19 | Name : Fedora Update for quagga FEDORA-2011-13492 File : nvt/gb_fedora_2011_13492_quagga_fc16.nasl |
2012-03-12 | Name : Gentoo Security Advisory GLSA 201202-02 (Quagga) File : nvt/glsa_201202_02.nasl |
2011-11-18 | Name : Ubuntu Update for quagga USN-1261-1 File : nvt/gb_ubuntu_USN_1261_1.nasl |
2011-10-21 | Name : Fedora Update for quagga FEDORA-2011-13504 File : nvt/gb_fedora_2011_13504_quagga_fc15.nasl |
2011-10-21 | Name : Fedora Update for quagga FEDORA-2011-13499 File : nvt/gb_fedora_2011_13499_quagga_fc14.nasl |
2011-10-16 | Name : Debian Security Advisory DSA 2316-1 (quagga) File : nvt/deb_2316_1.nasl |
2011-10-16 | Name : FreeBSD Ports: quagga File : nvt/freebsd_quagga2.nasl |
2011-08-09 | Name : CentOS Update for quagga CESA-2010:0785 centos5 i386 File : nvt/gb_CESA-2010_0785_quagga_centos5_i386.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-05 | Quagga telnet CLI buffer overflow attempt RuleID : 50871 - Type : SERVER-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-04-23 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201804-17.nasl - Type: ACT_GATHER_INFO |
2018-03-20 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1064.nasl - Type: ACT_GATHER_INFO |
2018-03-20 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1065.nasl - Type: ACT_GATHER_INFO |
2018-03-12 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-0377.nasl - Type: ACT_GATHER_INFO |
2018-03-07 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9cd3ff3784.nasl - Type: ACT_GATHER_INFO |
2018-03-07 | Name: The remote Fedora host is missing a security update. File: fedora_2018-b3e985489b.nasl - Type: ACT_GATHER_INFO |
2018-02-22 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-957.nasl - Type: ACT_GATHER_INFO |
2018-02-20 | Name: The remote Debian host is missing a security update. File: debian_DLA-1286.nasl - Type: ACT_GATHER_INFO |
2018-02-16 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4115.nasl - Type: ACT_GATHER_INFO |
2018-02-16 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_e15a22cef16f446b9ca76859350c2e75.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-7d25605e98.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2017-1307.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2017-1308.nasl - Type: ACT_GATHER_INFO |
2017-11-29 | Name: The remote Fedora host is missing a security update. File: fedora_2017-df3032c978.nasl - Type: ACT_GATHER_INFO |
2017-11-01 | Name: The remote Debian host is missing a security update. File: debian_DLA-1152.nasl - Type: ACT_GATHER_INFO |
2017-11-01 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3471-1.nasl - Type: ACT_GATHER_INFO |
2017-10-31 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4011.nasl - Type: ACT_GATHER_INFO |
2017-08-30 | Name: The remote SUSE host is missing one or more security updates. File: suse_SU-2017-2294-1.nasl - Type: ACT_GATHER_INFO |
2017-05-09 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-547.nasl - Type: ACT_GATHER_INFO |
2017-05-09 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-551.nasl - Type: ACT_GATHER_INFO |
2017-05-01 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2017-1058.nasl - Type: ACT_GATHER_INFO |
2017-04-06 | Name: The remote Scientific Linux host is missing one or more security updates. File: sl_20170321_quagga_on_SL6_x.nasl - Type: ACT_GATHER_INFO |
2017-03-30 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2017-0794.nasl - Type: ACT_GATHER_INFO |
2017-03-27 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2017-0794.nasl - Type: ACT_GATHER_INFO |
2017-03-22 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2017-0794.nasl - Type: ACT_GATHER_INFO |