Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1245

Опубликовано: 22 фев. 2017
Источник: debian
EPSS Низкий

Описание

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
quaggafixed1.0.20160315-3package

Примечания

  • Fixed by: https://github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546

  • https://lists.quagga.net/pipermail/quagga-users/2016-October/014478.html

EPSS

Процентиль: 78%
0.0119
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

CVSS3: 5.3
redhat
около 9 лет назад

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

CVSS3: 9.8
nvd
больше 8 лет назад

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

suse-cvrf
около 9 лет назад

Security update for quagga

suse-cvrf
около 9 лет назад

Security update for quagga

EPSS

Процентиль: 78%
0.0119
Низкий