First published: Thu Nov 18 2010(Updated: )
A NULL pointer dereference flaw was found in the way Quagga bgpd daemon processed malformed route information. A configured BGP peer could crash bgpd on a target system via a BGP message with specially-crafted value of BGP Extended Communities attribute.
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-654603 is considered high due to the potential for a denial of service.
To fix REDHAT-BUG-654603, update to the latest patched version of the Quagga bgpd daemon.
The potential impacts of REDHAT-BUG-654603 include the crashing of the bgpd daemon on the targeted system.
REDHAT-BUG-654603 affects the Quagga bgpd daemon in the Quagga Routing Software Suite.
There isn't a reliable workaround for REDHAT-BUG-654603 other than applying the available updates.