Описание
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 0.99.20.1-1 |
hardy | ignored | end of life |
lucid | released | 0.99.20.1-0ubuntu0.10.04.2 |
maverick | ignored | end of life |
natty | released | 0.99.20.1-0ubuntu0.11.04.2 |
oneiric | released | 0.99.20.1-0ubuntu0.11.10.2 |
precise | released | 0.99.20.1-0ubuntu0.12.04.2 |
upstream | released | 0.99.20.1-1 |
Показывать по
EPSS
3.3 Low
CVSS2
Связанные уязвимости
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c ...
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
EPSS
3.3 Low
CVSS2