Page 6 of 31 results (0.004 seconds)

CVSS: 5.0EPSS: 11%CPEs: 31EXPL: 3

The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error. El demonio BGP (bgpd) in Quagga v0.99.11 y anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) a través de una ruta AS que contiene elementos ASN cuya representación de cadena es mayor que la esperada, lo que provoca un error de aserción. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526311 http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html http://marc.info/?l=quagga-dev&m=123364779626078&w=2 http://secunia.com/advisories/34999 http://secunia.com/advisories/35061 http://secunia.com/advisories/35203 http://secunia.com/advisories/35685 http://thread.gmane.org/gmane.network.quagga.devel/6513 http://www.debian.org/security/2009/dsa-1788 http://www.mandriva.com/security/advisories?name&# •

CVSS: 3.5EPSS: 0%CPEs: 28EXPL: 0

bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled. bgpd en Quagga versiones anteriores a 0.99.9, permite que los peers BGP configurados explícitamente causen una denegación de servicio (bloqueo) por medio de (1) mensaje OPEN malformado o (2) un atributo COMMUNITY malformado, que desencadena una desreferencia del puntero NULL. NOTA: el vector 2 solo existe cuando la depuración está habilitada. • http://fedoranews.org/updates/FEDORA-2007-219.shtml http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html http://quagga.net/news2.php?y=2007&m=9&d=7#id1189190760 http://secunia.com/advisories/26744 http://secunia.com/advisories/26829 http://secunia.com/advisories/26863 http://secunia.com/advisories/27049 http://secunia.com/advisories/29743 http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1 http://www.debian.org/security/20 •

CVSS: 6.3EPSS: 2%CPEs: 20EXPL: 0

bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read. bgpd/bgp_attr.c en Quagga 0.98.6 y versiones anteriores, y 0.99.6 y versiones 0.99 anteriores, no validan la longitud de los valores en los atributos MP_REACH_NLRI y MP_UNREACH_NLRI, lo cual permite a atacantes remotos provocar una denegación de servicio (caída o finalización de demonio) mediante mensajes UPDATE manipulados que disparan un error de aserción o lectura fuera de límites. • http://bugzilla.quagga.net/show_bug.cgi?id=354 http://bugzilla.quagga.net/show_bug.cgi?id=355 http://secunia.com/advisories/24808 http://secunia.com/advisories/25084 http://secunia.com/advisories/25119 http://secunia.com/advisories/25255 http://secunia.com/advisories/25293 http://secunia.com/advisories/25312 http://secunia.com/advisories/25428 http://secunia.com/advisories/29743 http://security.gentoo.org/glsa/glsa-200705-05.xml http://sunsolve.sun.com/search/docume • CWE-20: Improper Input Validation •

CVSS: 4.9EPSS: 6%CPEs: 2EXPL: 2

bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface. • ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://lists.quagga.net/pipermail/quagga-dev/2006-March/004052.html http://secunia.com/advisories/20116 http://secunia.com/advisories/20137 http://secunia.com/advisories/20138 http://secunia.com/advisories/20221 http://secunia.com/advisories/20420 http://secunia.com/advisories/20421 http://secunia.com/advisories/20782 http://securitytracker.com/id?1016204 http://www.debian.org/security/2006/dsa-1059 htt • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE. RIPd en Quagga 0.98 y 0.99 anteriores a 20060503 no implementa adecuadamente configuraciones que (1) deshabiliten RIPv1 o (2) necesiten autenticación MD5 o en texto plano, lo que permite a atacantes remotos obtener información sensible (estado de encaminamiento) mediante paquetes "REQUEST" como "SEND UPDATE".º • https://www.exploit-db.com/exploits/27801 ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://bugzilla.quagga.net/show_bug.cgi?id=261 http://secunia.com/advisories/19910 http://secunia.com/advisories/20137 http://secunia.com/advisories/20138 http://secunia.com/advisories/20221 http://secunia.com/advisories/20420 http://secunia.com/advisories/20421 http://secunia.com/advisories/20782 http://secunia.com/advisories/21159 http://securitytracker.com • CWE-20: Improper Input Validation •