First published: Mon May 23 2016(Updated: )
The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite | ||
openSUSE | =42.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4049 is considered a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2016-4049, update Quagga to a version that addresses this vulnerability.
The potential impacts of CVE-2016-4049 include assertion failures and daemon crashes when processing large BGP packets.
CVE-2016-4049 affects the Quagga routing software suite as well as its deployments on OpenSUSE 42.1 and 13.2.
Remote attackers can exploit CVE-2016-4049 by sending large BGP packets to the affected service.