Описание
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 0.99.2-1ubuntu3.3 |
devel | released | 0.99.9-1ubuntu1 |
edgy | released | 0.99.4-4ubuntu1.2 |
feisty | released | 0.99.6-2ubuntu3.2 |
upstream | needs-triage |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly impleme ...
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
EPSS
5 Medium
CVSS2