GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Feb 21, 2012 7:26 pm Post subject: [ GLSA 201202-02 ] Quagga: Multiple vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: Quagga: Multiple vulnerabilities (GLSA 201202-02)
Severity: high
Exploitable: remote
Date: February 21, 2012
Bug(s): #334303, #359903, #384651
ID: 201202-02
Synopsis
Multiple vulnerabilities were found in Quagga, the worst of which
leading to remote execution of arbitrary code.
Background
Quagga is a free routing daemon replacing Zebra supporting RIP, OSPF and
BGP.
Affected Packages
Package: net-misc/quagga
Vulnerable: < 0.99.20
Unaffected: >= 0.99.20
Architectures: All supported architectures
Description
Multiple vulnerabilities have been discovered in Quagga. Please review
the CVE identifiers referenced below for details.
Impact
A BGP peer could send a Route-Refresh message with specially-crafted ORF
record, which can cause Quagga's bgpd to crash or possibly execute
arbitrary code with the privileges of the user running Quagga's bgpd; a
BGP update AS path request with unknown AS type, or malformed
AS-Pathlimit or Extended-Community attributes could lead to Denial of
Service (daemon crash), an error in bgpd when handling AS_PATH attributes
within UPDATE messages can
be exploited to cause a heap-based buffer overflow resulting in a crash
of the
daemon and disruption of IPv4 routing, two errors in ospf6d and ospfd can
each be exploited to crash the daemon and disrupt IP routing.
Workaround
There is no known workaround at this time.
Resolution
All Quagga users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/quagga-0.99.20"
|
References
CVE-2010-1674
CVE-2010-1675
CVE-2010-2948
CVE-2010-2949
CVE-2011-3323
CVE-2011-3324
CVE-2011-3325
CVE-2011-3326
CVE-2011-3327
Last edited by GLSA on Wed Feb 22, 2012 4:29 am; edited 1 time in total |
|