First published: Thu Oct 24 2013(Updated: )
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite | <=0.99.22.1 | |
Quagga Routing Software Suite | =0.99.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2236 has a high severity level due to its potential to cause a denial of service.
To fix CVE-2013-2236, update Quagga to version 0.99.22.2 or later.
CVE-2013-2236 is caused by a stack-based buffer overflow in the new_msg_lsa_change_notify function of the OSPFD API.
Yes, CVE-2013-2236 can be exploited remotely by attackers using a large LSA.
CVE-2013-2236 affects Quagga versions prior to 0.99.22.2 when --enable-opaque-lsa and the -a command line option are used.