Описание
It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.0.20160315-2ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [0.99.22.4-3ubuntu1.3]] |
| esm-infra/xenial | released | 0.99.24.1-2ubuntu1.2 |
| precise | released | 0.99.20.1-0ubuntu0.12.04.6 |
| trusty | released | 0.99.22.4-3ubuntu1.3 |
| trusty/esm | DNE | trusty was released [0.99.22.4-3ubuntu1.3] |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 0.99.24.1-2ubuntu1.2 |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
It was discovered that the zebra daemon in Quagga before 1.0.20161017 ...
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3