First published: Thu Apr 05 2012(Updated: )
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Quagga | <=0.99.20 | |
Quagga Quagga | =0.95 | |
Quagga Quagga | =0.96 | |
Quagga Quagga | =0.96.1 | |
Quagga Quagga | =0.96.2 | |
Quagga Quagga | =0.96.3 | |
Quagga Quagga | =0.96.4 | |
Quagga Quagga | =0.96.5 | |
Quagga Quagga | =0.97.0 | |
Quagga Quagga | =0.97.1 | |
Quagga Quagga | =0.97.2 | |
Quagga Quagga | =0.97.3 | |
Quagga Quagga | =0.97.4 | |
Quagga Quagga | =0.97.5 | |
Quagga Quagga | =0.98.0 | |
Quagga Quagga | =0.98.1 | |
Quagga Quagga | =0.98.2 | |
Quagga Quagga | =0.98.3 | |
Quagga Quagga | =0.98.4 | |
Quagga Quagga | =0.98.5 | |
Quagga Quagga | =0.98.6 | |
Quagga Quagga | =0.99.1 | |
Quagga Quagga | =0.99.2 | |
Quagga Quagga | =0.99.3 | |
Quagga Quagga | =0.99.4 | |
Quagga Quagga | =0.99.5 | |
Quagga Quagga | =0.99.6 | |
Quagga Quagga | =0.99.7 | |
Quagga Quagga | =0.99.8 | |
Quagga Quagga | =0.99.9 | |
Quagga Quagga | =0.99.10 | |
Quagga Quagga | =0.99.11 | |
Quagga Quagga | =0.99.12 | |
Quagga Quagga | =0.99.13 | |
Quagga Quagga | =0.99.14 | |
Quagga Quagga | =0.99.15 | |
Quagga Quagga | =0.99.16 | |
Quagga Quagga | =0.99.17 | |
Quagga Quagga | =0.99.18 | |
Quagga Quagga | =0.99.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.