CVE-2013-2236
Quagga: OSPFD Potential remote code exec (stack based buffer overflow)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
Desbordamiento de pila en la función new_msg_lsa_change_notify en OSPFD API (ospf_api.c) anterior a 0.99.222, cuando las opciones de línea de comandos --enable-opaque-lsa y -a son utilizadas, permite a atacantes rmeotos causar una denegación de servicio (crash) a través de un LSA grande.
A stack-based buffer overflow flaw was found in the way the Quagga OSPFD daemon handled LSA (link-state advertisement) packets. A remote attacker could use this flaw to crash the ospfd daemon resulting in denial of service.
Kostya Kortchinsky discovered that Quagga incorrectly handled certain route data when configured with BGP peers enabled for VPNv4. A remote attacker could use this issue to cause Quagga to crash, resulting in a denial of service, or possibly execute arbitrary code. It was discovered that Quagga incorrectly handled messages with a large LSA when used in certain configurations. A remote attacker could use this issue to cause Quagga to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-10-10 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://git.savannah.gnu.org/gitweb/?p=quagga.git%3Ba=commitdiff%3Bh=3f872fe60463a931c5c766dbf8c36870c0023e88 | X_refsource_confirm | |
http://lists.quagga.net/pipermail/quagga-dev/2013-July/010622.html | Mailing List | |
http://nongnu.mirrors.hostinginnederland.nl//quagga/quagga-0.99.22.3.changelog.txt | X_refsource_confirm | |
http://seclists.org/oss-sec/2013/q3/24 | Mailing List |
|
http://www.securityfocus.com/bid/60955 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2017-0794.html | 2023-11-07 | |
http://www.debian.org/security/2013/dsa-2803 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2941-1 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2013-2236 | 2017-03-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=981124 | 2017-03-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Quagga Search vendor "Quagga" | Quagga Search vendor "Quagga" for product "Quagga" | <= 0.99.22.1 Search vendor "Quagga" for product "Quagga" and version " <= 0.99.22.1" | - |
Affected
| ||||||
Quagga Search vendor "Quagga" | Quagga Search vendor "Quagga" for product "Quagga" | 0.99.22 Search vendor "Quagga" for product "Quagga" and version "0.99.22" | - |
Affected
|