Page 5 of 22 results (0.042 seconds)

CVSS: 5.0EPSS: 18%CPEs: 36EXPL: 0

bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message. bgpd en Quagga anteriores a v0.99.17 no realiza el análisis sintáctico las rutas AS, lo que permite a atacantes remotos provocar una denegación de servicio (desreferencia de puntero NULL y caída del demonio) a través de un tipo AS desconocido en un atributo AS en un mensaje BGP UPDATE. • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=cddb8112b80fa9867156c637d63e6e79eeac67bb http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://secunia.com/advisories/41038 http://secunia.com/advisories/41238 http://secunia.com/advisories/42397 http://secunia.com/advisories/42446 http://secunia.com/advisories/42498 http://secunia.com/advisories/48106 http://security.gentoo.org/glsa/glsa-201 •

CVSS: 6.5EPSS: 5%CPEs: 36EXPL: 0

Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message. Desbordamiento de búfer basado en pila en la función bgp_route_refresh_receive en bgp_packet.c en bgpd en Quagga anterior a v0.99.17, permite a usuarios remotos autenticados provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código a través de un registro Outbound Route Filtering (ORF) formado de forma errónea en un mensaje BGP ROUTE-REFRESH (RR). • http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3 http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://secunia.com/advisories/41038 http://secunia.com/advisories/41238 http://secunia.com/advisories/42397 http://secunia.com/advisories/42446 http://secunia.com/advisories/42498 http://secunia.com/advisories/48106 http://security.gentoo.org/glsa/glsa-201 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •