Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-5495 | First vendor Publication | 2017-01-24 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 3.6 | Temporal Score | 7.5 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5495 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-05 | Quagga telnet CLI buffer overflow attempt RuleID : 50871 - Revision : 1 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-03-20 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1065.nasl - Type : ACT_GATHER_INFO |
2017-11-01 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-3471-1.nasl - Type : ACT_GATHER_INFO |
2017-08-30 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-2294-1.nasl - Type : ACT_GATHER_INFO |
2017-05-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-547.nasl - Type : ACT_GATHER_INFO |
2017-05-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-551.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2017-1058.nasl - Type : ACT_GATHER_INFO |
2017-04-06 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20170321_quagga_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2017-03-30 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2017-0794.nasl - Type : ACT_GATHER_INFO |
2017-03-27 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2017-0794.nasl - Type : ACT_GATHER_INFO |
2017-03-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-0794.nasl - Type : ACT_GATHER_INFO |
2017-02-28 | Name : The remote Fedora host is missing a security update. File : fedora_2017-ba9c6a3634.nasl - Type : ACT_GATHER_INFO |
2017-02-15 | Name : The remote Fedora host is missing a security update. File : fedora_2017-b89a945e9d.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 13:07:43 |
|
2021-05-04 13:03:30 |
|
2021-04-22 02:17:09 |
|
2020-05-23 02:07:57 |
|
2020-05-23 01:02:54 |
|
2018-01-05 09:24:22 |
|
2017-11-02 13:25:26 |
|
2017-08-31 13:25:21 |
|
2017-07-26 09:23:13 |
|
2017-05-10 13:24:44 |
|
2017-05-02 13:24:37 |
|
2017-04-07 13:23:00 |
|
2017-03-31 13:22:46 |
|
2017-03-28 13:25:26 |
|
2017-03-23 13:24:15 |
|
2017-03-03 12:01:14 |
|
2017-03-01 13:25:37 |
|
2017-02-16 13:26:12 |
|
2017-01-26 21:23:50 |
|
2017-01-26 12:06:18 |
|
2017-01-24 12:02:56 |
|