First published: Fri May 05 2006(Updated: )
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite | =0.98.5 | |
Quagga Routing Software Suite | =0.99.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2223 is categorized as having a medium severity, as it allows remote attackers to access sensitive routing information.
To fix CVE-2006-2223, upgrade Quagga to version 0.98.6 or 0.99.4 or later where the vulnerability is addressed.
The vulnerable versions of Quagga are 0.98.5 and 0.99.3.
Yes, CVE-2006-2223 can lead to data leakage as it allows attackers to obtain sensitive routing state information through REQUEST packets.
While upgrading is the best option, a potential workaround is to disable RIPv1 and enforce authentication requirements if possible.