Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-2223

Опубликовано: 05 мая 2006
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5

Описание

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.

РелизСтатусПримечание
dapper

released

0.99.2-1ubuntu3.3
devel

released

0.99.9-1ubuntu1
edgy

released

0.99.4-4ubuntu1.2
feisty

released

0.99.6-2ubuntu3.2
upstream

needs-triage

Показывать по

EPSS

Процентиль: 94%
0.13585
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.

nvd
больше 19 лет назад

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.

debian
больше 19 лет назад

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly impleme ...

github
больше 3 лет назад

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.

fstec
около 19 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

EPSS

Процентиль: 94%
0.13585
Средний

5 Medium

CVSS2