Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5378

Опубликовано: 19 фев. 2018
Источник: debian

Описание

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
quaggafixed1.2.4-1package
quaggafixed1.1.1-3+deb9u2stretchpackage
quagganot-affectedjessiepackage
quagganot-affectedwheezypackage

Примечания

  • https://www.quagga.net/security/Quagga-2018-0543.txt

  • https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=cc2e6770697e343f4af534114ab7e633d5beabec

Связанные уязвимости

CVSS3: 7.1
ubuntu
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

CVSS3: 5.9
redhat
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

CVSS3: 7.1
nvd
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

CVSS3: 5.9
github
больше 3 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

suse-cvrf
почти 8 лет назад

Security update for quagga