
CVE-2013-6051 – Debian Security Advisory 2803-1
https://notcve.org/view.php?id=CVE-2013-6051
26 Nov 2013 — The bgp_attr_unknown function in bgp_attr.c in Quagga 0.99.21 does not properly initialize the total variable, which allows remote attackers to cause a denial of service (bgpd crash) via a crafted BGP update. La función bgp_attr_unknown en bgp_attr.c en Quagga 0.99.21 no inicializa correctamente la variable total, lo que permite a atacantes remotos provocar una denegación de servicio (caída bgpd) a través de una actualización manipulada de BGP. Multiple vulnerabilities were discovered in Quagga, a BGP/OSPF/... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730513 •

CVE-2013-2236 – Quagga: OSPFD Potential remote code exec (stack based buffer overflow)
https://notcve.org/view.php?id=CVE-2013-2236
10 Oct 2013 — Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. Desbordamiento de pila en la función new_msg_lsa_change_notify en OSPFD API (ospf_api.c) anterior a 0.99.222, cuando las opciones de línea de comandos --enable-opaque-lsa y -a son utilizadas, permite a atacantes rmeotos causar una denegació... • http://git.savannah.gnu.org/gitweb/?p=quagga.git%3Ba=commitdiff%3Bh=3f872fe60463a931c5c766dbf8c36870c0023e88 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2012-1820 – (bgpd): Assertion failure by processing BGP OPEN message with malformed ORF capability TLV (VU#962587)
https://notcve.org/view.php?id=CVE-2012-1820
13 Jun 2012 — The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message. La función bgp_capability_orf de bgpd de Quagga 0.99.20.1 y anteriores permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y finalización del demonio) basándose en una relación "BGP peering... • http://rhn.redhat.com/errata/RHSA-2012-1259.html •

CVE-2012-0249 – (ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet
https://notcve.org/view.php?id=CVE-2012-0249
05 Apr 2012 — Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header. Desbordamiento de búfer en la función ospf_ls_upd_list_lsa en ospf_packet.c en la implementación de OSPFv2 en ospfd en Quagga antes v0.99.20.1 permite a atacantes remotos causar una de... • http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078794.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-0250 – (ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures
https://notcve.org/view.php?id=CVE-2012-0250
05 Apr 2012 — Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field. Desbordamiento de búfer en la implementación de OSPFv2 en ospfd en Quagga antes de v0.99.20.1 permite a atacantes remotos causar una denegación de servicio (caída del demonio) ... • http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078794.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-0255 – (bgpd): Assertion failure by processing malformed AS4 capability in BGP OPEN message
https://notcve.org/view.php?id=CVE-2012-0255
05 Apr 2012 — The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability). La implementación de BGP en bgpd en Quagga antes v0.99.20.1 no utiliza adecuadamente los búferes de mensajes para los mensajes marcados como OPEN, lo que permite a atacantes remotos provocar una denegación ... • http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078794.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-3323 – (ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA
https://notcve.org/view.php?id=CVE-2011-3323
10 Oct 2011 — The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length. La implementación de OSPFv3 en ospf6d en Quagga anteriores a v0.99.19 permite a atacantes remotos causar una denegación de servicio (acceso de memoria fuera de rango y la caída del demonio) a través de un mensaje de actualización de enlace del Estado con una longitud de prefijo IPv6... • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=abc7ef44ca05493500865ce81f7b84f5c4eb6594 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2011-3324 – (ospf6d): Denial of service by decoding malformed Database Description packet headers
https://notcve.org/view.php?id=CVE-2011-3324
10 Oct 2011 — The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message. La función ospf6_lsa_is_changed en ospf6_lsa.c en la ejecución de OSPFv3 en ospf6d en Quagga anteriores a v0.99.19 permite a atacantes remotos causar una denegación de servicio (error de aserció... • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=09395e2a0e93b2cf4258cb1de91887948796bb68 • CWE-399: Resource Management Errors •

CVE-2011-3325 – (ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type
https://notcve.org/view.php?id=CVE-2011-3325
10 Oct 2011 — ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet. ospf_packet.c en ospfd en Quagga anterior a v0.99.19 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través (1) un tipo de campo 0x0a en una cabecera del paquete en IPv4 o (2) un paquete Hello IPv4 truncado. • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=61ab0301606053192f45c188bc48afc837518770 • CWE-399: Resource Management Errors •

CVE-2011-3326 – (ospfd): Denial of service by decoding Link State Update LSAs of unknown type
https://notcve.org/view.php?id=CVE-2011-3326
10 Oct 2011 — The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message. La función ospf_flood en ospf_flood.c en ospfd en Quagga anterior a v0.99.19 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un Link State Advertisement (LSA) inválido en un mensaje IPv4 Link State Update. • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=6b161fc12a15aba8824c84d1eb38e529aaf70769 • CWE-399: Resource Management Errors •