what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

OpenPKG Security Advisory 2007.15

OpenPKG Security Advisory 2007.15
Posted May 21, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - A Denial of Service (DoS) vulnerability exists in the routing daemon Quagga, versions up to and including 0.99.6. The Quagga bgpd(8) daemon is vulnerable as configured peers may cause it to abort because of an assertion which can be triggered by peers by sending an "UPDATE" message with a specially crafted, malformed Multi-Protocol reachable/unreachable "NLRI" attribute.

tags | advisory, denial of service, protocol
advisories | CVE-2007-1995
SHA-256 | 12492b05bc1c9dd6d3ab14537255e48285c3a6cb1a68486580a7e74f2e78c677

OpenPKG Security Advisory 2007.15

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

____________________________________________________________________________

Publisher Name: OpenPKG GmbH
Publisher Home: http://openpkg.com/

Advisory Id (public): OpenPKG-SA-2007.015
Advisory Type: OpenPKG Security Advisory (SA)
Advisory Directory: http://openpkg.com/go/OpenPKG-SA
Advisory Document: http://openpkg.com/go/OpenPKG-SA-2007.015
Advisory Published: 2007-05-18 08:00 UTC

Issue Id (internal): OpenPKG-SI-20070518.01
Issue First Created: 2007-05-18
Issue Last Modified: 2007-05-18
Issue Revision: 02
____________________________________________________________________________

Subject Name: Quagga
Subject Summary: Routing Daemon
Subject Home: http://www.quagga.net/
Subject Versions: * <= 0.99.6

Vulnerability Id: CVE-2007-1995
Vulnerability Scope: global (not OpenPKG specific)

Attack Feasibility: run-time
Attack Vector: remote network
Attack Impact: denial of service

Description:
A Denial of Service (DoS) vulnerability exists in the routing
daemon Quagga [0], versions up to and including 0.99.6. The Quagga
bgpd(8) daemon is vulnerable as configured peers may cause it to
abort because of an assertion which can be triggered by peers by
sending an "UPDATE" message with a specially crafted, malformed
Multi-Protocol reachable/unreachable "NLRI" attribute [1].

References:
[0] http://www.quagga.net/
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995
____________________________________________________________________________

Primary Package Name: quagga
Primary Package Home: http://openpkg.org/go/package/quagga

Corrected Distribution: Corrected Branch: Corrected Package:
OpenPKG Enterprise E1.0-SOLID quagga-0.99.5-E1.0.1
OpenPKG Community CURRENT quagga-0.99.7-20070430
____________________________________________________________________________

For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.
____________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG GmbH <http://openpkg.com/>

iD8DBQFGTUD+ZwQuyWG3rjQRApgTAJ9lXl+n8y1zkQTntreB42qA/dRLuwCff7dp
1QxgtYur89bdTFHxJo65+Vg=
=UMkX
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close