Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-5495

Опубликовано: 24 янв. 2017
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.8
CVSS3: 7.5

Описание

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.

РелизСтатусПримечание
artful

not-affected

1.1.1-3
devel

not-affected

1.1.1-3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [0.99.22.4-3ubuntu1.4]]
esm-infra/xenial

released

0.99.24.1-2ubuntu1.3
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

0.99.22.4-3ubuntu1.4
trusty/esm

DNE

trusty was released [0.99.22.4-3ubuntu1.4]
upstream

released

1.1.1
vivid/stable-phone-overlay

DNE

Показывать по

EPSS

Процентиль: 87%
0.03624
Низкий

7.8 High

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
почти 9 лет назад

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.

CVSS3: 7.5
nvd
почти 9 лет назад

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.

CVSS3: 7.5
debian
почти 9 лет назад

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbou ...

suse-cvrf
больше 8 лет назад

Security update for quagga

CVSS3: 7.5
github
больше 3 лет назад

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.

EPSS

Процентиль: 87%
0.03624
Низкий

7.8 High

CVSS2

7.5 High

CVSS3