First published: Wed Sep 12 2007(Updated: )
bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite | =0.99.2 | |
Quagga Routing Software Suite | =0.97.5 | |
Quagga Routing Software Suite | =0.95 | |
Quagga Routing Software Suite | =0.98.3 | |
Quagga Routing Software Suite | =0.96.3 | |
Quagga Routing Software Suite | =0.99.4 | |
Quagga Routing Software Suite | =0.99.7 | |
Quagga Routing Software Suite | =0.99.5 | |
Quagga Routing Software Suite | =0.96.5 | |
Quagga Routing Software Suite | =0.98.0 | |
Quagga Routing Software Suite | =0.96.1 | |
Quagga Routing Software Suite | =0.98.1 | |
Quagga Routing Software Suite | =0.96.4 | |
Quagga Routing Software Suite | =0.98.5 | |
Quagga Routing Software Suite | =0.97.3 | |
Quagga Routing Software Suite | =0.99.3 | |
Quagga Routing Software Suite | <=0.99.8 | |
Quagga Routing Software Suite | =0.99.6 | |
Quagga Routing Software Suite | =0.98.6 | |
Quagga Routing Software Suite | =0.97.4 | |
Quagga Routing Software Suite | =0.98.4 | |
Quagga Routing Software Suite | =0.98.2 | |
Quagga Routing Software Suite | =0.97.1 | |
Quagga Routing Software Suite | =0.97.0 | |
Quagga Routing Software Suite | =0.96.2 | |
Quagga Routing Software Suite | =0.99.1 | |
Quagga Routing Software Suite | =0.97.2 | |
Quagga Routing Software Suite | =0.96 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4826 is classified as a denial-of-service vulnerability.
To fix CVE-2007-4826, update Quagga to version 0.99.9 or later.
CVE-2007-4826 affects Quagga versions 0.95 through 0.99.8.
CVE-2007-4826 can be exploited by sending a malformed OPEN message or COMMUNITY attribute to a BGP peer.
Debugging mode is not necessary for the initial attack vector but is required for exploiting the COMMUNITY attribute.