exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice USN-1095-1

Ubuntu Security Notice USN-1095-1
Posted Mar 29, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1095-1 - It was discovered that Quagga incorrectly parsed certain malformed extended communities. A remote attacker could use this flaw to cause Quagga to crash, resulting in a denial of service. It was discovered that Quagga resets BGP sessions when encountering malformed AS_PATHLIMIT attributes. A remote attacker could use this flaw to disrupt BGP sessions, resulting in a denial of service. This update removes AS_PATHLIMIT support from Quagga. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2010-1674, CVE-2010-1675
SHA-256 | ace92018aca8cb5f956fcdd7df537578af7168e4da59950e1a0e8cf32c374692

Ubuntu Security Notice USN-1095-1

Change Mirror Download
===========================================================
Ubuntu Security Notice USN-1095-1 March 29, 2011
quagga vulnerabilities
CVE-2010-1674, CVE-2010-1675
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
quagga 0.99.2-1ubuntu3.8

Ubuntu 8.04 LTS:
quagga 0.99.9-2ubuntu1.5

Ubuntu 9.10:
quagga 0.99.13-1ubuntu0.2

Ubuntu 10.04 LTS:
quagga 0.99.15-1ubuntu0.2

Ubuntu 10.10:
quagga 0.99.17-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that Quagga incorrectly parsed certain malformed extended
communities. A remote attacker could use this flaw to cause Quagga to
crash, resulting in a denial of service. (CVE-2010-1674)

It was discovered that Quagga resets BGP sessions when encountering
malformed AS_PATHLIMIT attributes. A remote attacker could use this flaw to
disrupt BGP sessions, resulting in a denial of service. This update removes
AS_PATHLIMIT support from Quagga. This issue only affected Ubuntu 8.04 LTS,
9.10, 10.04 LTS and 10.10. (CVE-2010-1675)


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.8.diff.gz
Size/MD5: 36113 1eb66fc5a3782ce0589f2b282e696be2
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.8.dsc
Size/MD5: 1411 87fd7a9171f7c4a4783ad4dc0805f1e1
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2.orig.tar.gz
Size/MD5: 2185137 88087d90697fcf5fe192352634f340b3

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.2-1ubuntu3.8_all.deb
Size/MD5: 664436 d8113a629e9b671fc0bb82464673039d

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.8_amd64.deb
Size/MD5: 1401410 014fe0299907e363b1ffb42c75c89ee1

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.8_i386.deb
Size/MD5: 1199776 21c7bb4881d3ba04dfc33e862571307f

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.8_powerpc.deb
Size/MD5: 1351840 38aed9b6353cb4726cede9f8ec9316b0

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.8_sparc.deb
Size/MD5: 1322762 acb31557865b45c8f66cec902472f18f

Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5.diff.gz
Size/MD5: 39262 3c6096477f97056af0838c3408b04f35
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5.dsc
Size/MD5: 1620 80f65b3b497f46ec444fa32c2162bbc4
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9.orig.tar.gz
Size/MD5: 2341067 4dbdaf91bf6609803819d97d5fccc4c9

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.9-2ubuntu1.5_all.deb
Size/MD5: 662098 1c1e9e6549bb08f0a35b67f0d3912b9d

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5_amd64.deb
Size/MD5: 1620432 1951c3240090d233607c5e89bd1225db

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5_i386.deb
Size/MD5: 1463056 15eddb43ab310e96ef948547469e72a5

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5_lpia.deb
Size/MD5: 1462096 ed77eba019eb94648d3fa9511f5a66b1

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5_powerpc.deb
Size/MD5: 1659220 0b0d9f9d494bd351004c24deba1486e5

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.5_sparc.deb
Size/MD5: 1521800 69d72391cb794ea1aff05a3c027d1d0b

Updated packages for Ubuntu 9.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2.diff.gz
Size/MD5: 36744 ca2b7bc99044a0cd3a9dca3074092d7e
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2.dsc
Size/MD5: 2062 f56ce9074d4b944d1ac402917751c8d2
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.13.orig.tar.gz
Size/MD5: 2172551 55a7d2dcf016580a7c7412b3518cd942

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.13-1ubuntu0.2_all.deb
Size/MD5: 661830 d317a74df29d0d9d2b29d8125901fbdc

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2_amd64.deb
Size/MD5: 1704898 517cf7575403cc3d8dfad3919cc94222

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2_i386.deb
Size/MD5: 1565536 2b55c6c86db3e7975532beb621cdf2d1

armel architecture (ARM Architecture):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2_armel.deb
Size/MD5: 1494646 8e7bb17883bb8b330631ce1940ca1325

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2_lpia.deb
Size/MD5: 1550538 90aecebc5d3e040b4f39cde032254e4e

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2_powerpc.deb
Size/MD5: 1646082 0dbfc717390f284b00b373eb9c8eddc1

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.13-1ubuntu0.2_sparc.deb
Size/MD5: 1624232 0ad27739f04adebb1041175ba59ac9db

Updated packages for Ubuntu 10.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2.diff.gz
Size/MD5: 38186 c160867f187579266c7e9e2530901c46
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2.dsc
Size/MD5: 2043 2782c599e61e924024bac7c91bf625dc
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.15.orig.tar.gz
Size/MD5: 2191159 8975414c76a295f4855a417af0b5ddce

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.15-1ubuntu0.2_all.deb
Size/MD5: 764192 21b1009ec5cfa212cfb67b510de43195

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2_amd64.deb
Size/MD5: 1713668 9437d1d013562e9d5d1f63f13e793076

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2_i386.deb
Size/MD5: 1570952 c5d82ca896668c53ef9677f0fee9eaa5

armel architecture (ARM Architecture):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2_armel.deb
Size/MD5: 1514696 16e37adb96dc8598618197de47acd024

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2_powerpc.deb
Size/MD5: 1653666 6003dce9a240f5fa898c3998d427bb25

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.15-1ubuntu0.2_sparc.deb
Size/MD5: 1669528 9b6a52df93c0b1df44b96c3d3bf0981b

Updated packages for Ubuntu 10.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.17-1ubuntu0.1.diff.gz
Size/MD5: 36082 0ea8c4782b542282bc7df2802f946901
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.17-1ubuntu0.1.dsc
Size/MD5: 2052 472f8f02bc416bf043867b062434dba1
http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.17.orig.tar.gz
Size/MD5: 2202151 37b9022adca04b03863d2d79787e643f

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.17-1ubuntu0.1_all.deb
Size/MD5: 608746 60d0be23780e4b79af1e9eece53ddb89

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.17-1ubuntu0.1_amd64.deb
Size/MD5: 1693118 512b7d6309cfaee4beb2196bf47c56be

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.17-1ubuntu0.1_i386.deb
Size/MD5: 1546418 e6a2d015781c42db6ce07c5a17f0bfea

armel architecture (ARM Architecture):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.17-1ubuntu0.1_armel.deb
Size/MD5: 1580728 7aa4098e017a8c5e721e91712d13d7b2

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.17-1ubuntu0.1_powerpc.deb
Size/MD5: 1626462 21bd8343d8d5753b08b581b93e158f93



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close