CWE
119
Advisory Published

RHSA-2012:1259: Moderate: quagga security update

First published: Wed Sep 12 2012(Updated: )

Quagga is a TCP/IP based routing software suite. The Quagga bgpd daemon<br>implements the BGP (Border Gateway Protocol) routing protocol. The Quagga<br>ospfd and ospf6d daemons implement the OSPF (Open Shortest Path First)<br>routing protocol.<br>A heap-based buffer overflow flaw was found in the way the bgpd daemon<br>processed malformed Extended Communities path attributes. An attacker could<br>send a specially-crafted BGP message, causing bgpd on a target system to<br>crash or, possibly, execute arbitrary code with the privileges of the user<br>running bgpd. The UPDATE message would have to arrive from an explicitly<br>configured BGP peer, but could have originated elsewhere in the BGP<br>network. (CVE-2011-3327)<br>A stack-based buffer overflow flaw was found in the way the ospf6d daemon<br>processed malformed Link State Update packets. An OSPF router could use<br>this flaw to crash ospf6d on an adjacent router. (CVE-2011-3323)<br>A flaw was found in the way the ospf6d daemon processed malformed link<br>state advertisements. An OSPF neighbor could use this flaw to crash<br>ospf6d on a target system. (CVE-2011-3324)<br>A flaw was found in the way the ospfd daemon processed malformed Hello<br>packets. An OSPF neighbor could use this flaw to crash ospfd on a<br>target system. (CVE-2011-3325)<br>A flaw was found in the way the ospfd daemon processed malformed link state<br>advertisements. An OSPF router in the autonomous system could use this flaw<br>to crash ospfd on a target system. (CVE-2011-3326)<br>An assertion failure was found in the way the ospfd daemon processed<br>certain Link State Update packets. An OSPF router could use this flaw to<br>cause ospfd on an adjacent router to abort. (CVE-2012-0249)<br>A buffer overflow flaw was found in the way the ospfd daemon processed<br>certain Link State Update packets. An OSPF router could use this flaw to<br>crash ospfd on an adjacent router. (CVE-2012-0250)<br>Two flaws were found in the way the bgpd daemon processed certain BGP OPEN<br>messages. A configured BGP peer could cause bgpd on a target system to<br>abort via a specially-crafted BGP OPEN message. (CVE-2012-0255,<br>CVE-2012-1820)<br>Red Hat would like to thank CERT-FI for reporting CVE-2011-3327,<br>CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and CVE-2011-3326; and the<br>CERT/CC for reporting CVE-2012-0249, CVE-2012-0250, CVE-2012-0255, and<br>CVE-2012-1820. CERT-FI acknowledges Riku Hietamäki, Tuomo Untinen and Jukka<br>Taimisto of the Codenomicon CROSS project as the original reporters of<br>CVE-2011-3327, CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and<br>CVE-2011-3326. The CERT/CC acknowledges Martin Winter at<br>OpenSourceRouting.org as the original reporter of CVE-2012-0249,<br>CVE-2012-0250, and CVE-2012-0255, and Denis Ovsienko as the original<br>reporter of CVE-2012-1820.<br>Users of quagga should upgrade to these updated packages, which contain<br>backported patches to correct these issues. After installing the updated<br>packages, the bgpd, ospfd, and ospf6d daemons will be restarted<br>automatically.<br>

Affected SoftwareAffected VersionHow to fix
redhat/quagga<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga-contrib<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga-debuginfo<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga-debuginfo<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga-devel<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga-devel<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2
redhat/quagga-contrib<0.99.15-7.el6_3.2
0.99.15-7.el6_3.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203