Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5378

Опубликовано: 15 фев. 2018
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

An out-of-bounds read vulnerability was discovered in Quagga. A BGP peer could send a specially crafted message which would cause Quagga to read out of bounds, potentially causing a crash or disclosure of up to 64KB process memory to the peer.

Отчет

This vulnerability affects Quagga versions after 1.1.0. Versions 0.99.x, included with Red Hat Enterprise Linux, are not affected by this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5quaggaNot affected
Red Hat Enterprise Linux 6quaggaNot affected
Red Hat Enterprise Linux 7quaggaNot affected
Red Hat Enterprise Linux 8quaggaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119->CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1542972quagga: bgpd does not properly bounds check the data sent with a NOTIFY allowing leak of sensitive data or crash

EPSS

Процентиль: 93%
0.09623
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

CVSS3: 7.1
nvd
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

CVSS3: 7.1
debian
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly ...

CVSS3: 5.9
github
больше 3 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

suse-cvrf
почти 8 лет назад

Security update for quagga

EPSS

Процентиль: 93%
0.09623
Низкий

5.9 Medium

CVSS3