First published: Thu Apr 05 2012(Updated: )
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Quagga | <=0.99.20 | |
Quagga Quagga | =0.99.1 | |
Quagga Quagga | =0.99.2 | |
Quagga Quagga | =0.99.3 | |
Quagga Quagga | =0.99.4 | |
Quagga Quagga | =0.99.5 | |
Quagga Quagga | =0.99.6 | |
Quagga Quagga | =0.99.7 | |
Quagga Quagga | =0.99.8 | |
Quagga Quagga | =0.99.9 | |
Quagga Quagga | =0.99.10 | |
Quagga Quagga | =0.99.11 | |
Quagga Quagga | =0.99.12 | |
Quagga Quagga | =0.99.13 | |
Quagga Quagga | =0.99.14 | |
Quagga Quagga | =0.99.15 | |
Quagga Quagga | =0.99.16 | |
Quagga Quagga | =0.99.17 | |
Quagga Quagga | =0.99.18 | |
Quagga Quagga | =0.99.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.