First published: Tue Aug 24 2010(Updated: )
A NULL pointer dereference flaw was found in the way Quagga's bgpd daemon parsed paths of autonomous systems (AS). A configured BGP peer could send a BGP update AS path request with unknown AS type, which could lead to denial of service (bgpd daemon crash). Upstream changeset: [1] <a href="http://code.quagga.net/?p=quagga.git;a=commit;h=cddb8112b80fa9867156c637d63e6e79eeac67bb">http://code.quagga.net/?p=quagga.git;a=commit;h=cddb8112b80fa9867156c637d63e6e79eeac67bb</a> References: [2] <a href="http://www.quagga.net/news2.php?y=2010&m=8&d=19#id1282241100">http://www.quagga.net/news2.php?y=2010&m=8&d=19#id1282241100</a> CVE Request: [3] <a href="http://www.openwall.com/lists/oss-security/2010/08/24/3">http://www.openwall.com/lists/oss-security/2010/08/24/3</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-626795 is classified as high due to its potential to cause denial of service.
To fix REDHAT-BUG-626795, ensure you update to the latest version of the Quagga routing software that addresses this NULL pointer dereference vulnerability.
REDHAT-BUG-626795 is caused by a NULL pointer dereference that occurs when the bgpd daemon processes a BGP update with an unknown AS type.
The software affected by REDHAT-BUG-626795 is the bgpd daemon within the Quagga Routing Software Suite.
The impact of REDHAT-BUG-626795 is that it can lead to a crash of the bgpd daemon, resulting in a denial of service for BGP routing.