First published: Thu Nov 18 2010(Updated: )
A security flaw was found in the way Quagga bgpd daemon processed certain route metrics information. A configured BGP peer could use this flaw to send a BGP message with specially-crafted value of AS-path attribute, which would cause the bgpd daemon on all systems on the route the message travels to reset the BGP session.
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Routing Software Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-654614 is critical due to its potential impact on BGP routing stability.
To fix REDHAT-BUG-654614, update your Quagga bgpd software to the latest patched version.
The software affected by REDHAT-BUG-654614 is the Quagga Routing Software Suite, specifically the bgpd daemon.
REDHAT-BUG-654614 is a security flaw that involves improper processing of BGP messages.
A configured BGP peer can exploit REDHAT-BUG-654614 by sending specially-crafted BGP messages.