Page 7 of 36 results (0.032 seconds)

CVSS: 4.9EPSS: 6%CPEs: 2EXPL: 2

bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface. • ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://lists.quagga.net/pipermail/quagga-dev/2006-March/004052.html http://secunia.com/advisories/20116 http://secunia.com/advisories/20137 http://secunia.com/advisories/20138 http://secunia.com/advisories/20221 http://secunia.com/advisories/20420 http://secunia.com/advisories/20421 http://secunia.com/advisories/20782 http://securitytracker.com/id?1016204 http://www.debian.org/security/2006/dsa-1059 htt • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 16%CPEs: 5EXPL: 2

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets. RIPd en Quagga 0.98 y 0.99 anteriores a 20060503 no imponen adecuadamente los requerimientos de autenticación de de RIPv2, lo que permite a atacantes remotos modificar el estado de encaminamiento mediante paquetes RIPv1 "RESPONSE". • https://www.exploit-db.com/exploits/27802 ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://bugzilla.quagga.net/show_bug.cgi?id=262 http://secunia.com/advisories/19910 http://secunia.com/advisories/20137 http://secunia.com/advisories/20138 http://secunia.com/advisories/20221 http://secunia.com/advisories/20420 http://secunia.com/advisories/20421 http://secunia.com/advisories/20782 http://secunia.com/advisories/21159 http://securitytracker.com • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE. RIPd en Quagga 0.98 y 0.99 anteriores a 20060503 no implementa adecuadamente configuraciones que (1) deshabiliten RIPv1 o (2) necesiten autenticación MD5 o en texto plano, lo que permite a atacantes remotos obtener información sensible (estado de encaminamiento) mediante paquetes "REQUEST" como "SEND UPDATE".º • https://www.exploit-db.com/exploits/27801 ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://bugzilla.quagga.net/show_bug.cgi?id=261 http://secunia.com/advisories/19910 http://secunia.com/advisories/20137 http://secunia.com/advisories/20138 http://secunia.com/advisories/20221 http://secunia.com/advisories/20420 http://secunia.com/advisories/20421 http://secunia.com/advisories/20782 http://secunia.com/advisories/21159 http://securitytracker.com • CWE-20: Improper Input Validation •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Zebra 0.93b and earlier, and quagga before 0.95, allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface. Zebra anteriores a 0.91 y quagga anteriores a 0.95 permite a usuarios locales causar una denegación de servicio enviando mensajes suplantando a otros usuarios al interfaz del kernel netlink. • http://secunia.com/advisories/10563 http://www.debian.org/security/2004/dsa-415 http://www.redhat.com/support/errata/RHSA-2003-305.html http://www.redhat.com/support/errata/RHSA-2003-307.html http://www.redhat.com/support/errata/RHSA-2003-315.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10169 https://access.redhat.com/security/cve/CVE-2003-0858 https://bugzilla.redhat.com/show_bug.cgi?id=1617096 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 1

The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference. La capa vty en Quagga anteriores a 0.96.4, y Zebra anteriores a 0.91, no verifica si se está llevando a cabo una sub-negociación cuando procesa el marcador SE, lo que permite a atacantes remotos causar una denegación de servicio (caída) mediante un comando telnet malformado al puerto telnet CLI, lo que puede disparar una desreferencia de memoria nula. • https://www.exploit-db.com/exploits/23375 http://marc.info/?l=bugtraq&m=106883387304266&w=2 http://secunia.com/advisories/10563 http://www.debian.org/security/2004/dsa-415 http://www.redhat.com/support/errata/RHSA-2003-305.html http://www.redhat.com/support/errata/RHSA-2003-307.html https://access.redhat.com/security/cve/CVE-2003-0795 https://bugzilla.redhat.com/show_bug.cgi?id=1617088 • CWE-20: Improper Input Validation •