Описание
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 0.99.20.1-1 |
hardy | ignored | end of life |
lucid | released | 0.99.20.1-0ubuntu0.10.04.2 |
maverick | ignored | end of life |
natty | released | 0.99.20.1-0ubuntu0.11.04.2 |
oneiric | released | 0.99.20.1-0ubuntu0.11.10.2 |
precise | released | 0.99.20.1-0ubuntu0.12.04.2 |
upstream | released | 0.99.20.1-1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not pro ...
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
EPSS
5 Medium
CVSS2