CVE-2010-1674 – quagga: DoS (crash) by processing malformed extended community attribute in a route
https://notcve.org/view.php?id=CVE-2010-1674
The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute. El parser "extended-community" de bgpd de Quagga en versiones anteriores a la 0.99.18 permite a atacantes remotos provocar una denegación de servicio (resolución de puntero NULL y caída de la aplicación) a través de un atributo "Extended Communities" mal formado. • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://rhn.redhat.com/errata/RHSA-2012-1258.html http://secunia.com/advisories/43499 http://secunia.com/advisories/43770 http://secunia.com/advisories/48106 http://security.gentoo.org/glsa/glsa-201202-02.xml http://www.debian.org/security/2011/dsa-2197 http://www.mandriva.com/security/advisories?name=MDVSA-2011:058 http://www.o •
CVE-2010-1675 – quagga: BGP session reset by processing BGP Update message with malformed AS-path attributes
https://notcve.org/view.php?id=CVE-2010-1675
bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute. bgpd de Quagga en versiones anteriores a la 0.99.18 permite a atacantes remotos provocar una denegación de servicio (reinicio de la sesión) a traés de un atributo de ruta AS_PATHLIMIT mal formado. • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://secunia.com/advisories/43499 http://secunia.com/advisories/43770 http://secunia.com/advisories/48106 http://security.gentoo.org/glsa/glsa-201202-02.xml http://www.debian.org/security/2011/dsa-2197 http://www.mandriva.com/security/advisories?name=MDVSA-2011:058 http://www.osvdb.org/71258 http://www.quagga.net/news2.php?y& • CWE-399: Resource Management Errors •
CVE-2010-2949 – (bgpd): DoS (crash) while processing certain BGP update AS path messages
https://notcve.org/view.php?id=CVE-2010-2949
bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message. bgpd en Quagga anteriores a v0.99.17 no realiza el análisis sintáctico las rutas AS, lo que permite a atacantes remotos provocar una denegación de servicio (desreferencia de puntero NULL y caída del demonio) a través de un tipo AS desconocido en un atributo AS en un mensaje BGP UPDATE. • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=cddb8112b80fa9867156c637d63e6e79eeac67bb http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://secunia.com/advisories/41038 http://secunia.com/advisories/41238 http://secunia.com/advisories/42397 http://secunia.com/advisories/42446 http://secunia.com/advisories/42498 http://secunia.com/advisories/48106 http://security.gentoo.org/glsa/glsa-201 •
CVE-2010-2948 – (bgpd): Stack buffer overflow by processing certain Route-Refresh messages
https://notcve.org/view.php?id=CVE-2010-2948
Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message. Desbordamiento de búfer basado en pila en la función bgp_route_refresh_receive en bgp_packet.c en bgpd en Quagga anterior a v0.99.17, permite a usuarios remotos autenticados provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código a través de un registro Outbound Route Filtering (ORF) formado de forma errónea en un mensaje BGP ROUTE-REFRESH (RR). • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3 http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://secunia.com/advisories/41038 http://secunia.com/advisories/41238 http://secunia.com/advisories/42397 http://secunia.com/advisories/42446 http://secunia.com/advisories/42498 http://secunia.com/advisories/48106 http://security.gentoo.org/glsa/glsa-201 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •
CVE-2009-1572
https://notcve.org/view.php?id=CVE-2009-1572
The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error. El demonio BGP (bgpd) in Quagga v0.99.11 y anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) a través de una ruta AS que contiene elementos ASN cuya representación de cadena es mayor que la esperada, lo que provoca un error de aserción. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526311 http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html http://marc.info/?l=quagga-dev&m=123364779626078&w=2 http://secunia.com/advisories/34999 http://secunia.com/advisories/35061 http://secunia.com/advisories/35203 http://secunia.com/advisories/35685 http://thread.gmane.org/gmane.network.quagga.devel/6513 http://www.debian.org/security/2009/dsa-1788 http://www.mandriva.com/security/advisories?name •