// For flags

CVE-2017-3224

Open Shortest Path First (OSPF) protocol implementations may improperly determine LSA recency in affected Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages)

Severity Score

8.2
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages).

Las implementaciones del protocolo Open Shortest Path First (OSPF) podrían determinar el recency Link State Advertisement (LSA) para los LSA con MaxSequenceNumber. Según la sección 13.1 de RFC 2328, para dos instancias del mismo LSA, el recency se determina comparando, en primer lugar, los números de secuencia, las sumas de verificación y, finalmente, MaxAge. En el caso en el que los números de secuencia son los mismos, el LSA con la suma de verificación más grande se considera más reciente y no será vaciado del LSDB (Link State Database). Debido a que el RFC no indica explícitamente que los valores de los enlaces conducidos por un LSA deben ser los mismos cuando un LSA autogenerado se caduca prematuramente con MaxSequenceNumber, en las implementaciones OSPF vulnerables es posible que un atacante manipule un LSA con MaxSequenceNumber y enlaces inválidos que resultarán en una suma de verificación más grande y, por lo tanto, no se vaciará un LSA "más nuevo" desde el LSDB. La propagación del LSA manipulado puede resultar en la eliminación o alteración de las tablas de enrutamiento en el dominio de enrutamiento, lo que crea una condición de denegación de servicio (DoS) o el reenrutamiento de tráfico en la red. CVE-2017-3224 ha sido reservado para Quagga y las implementaciones descendientes (paquetes SUSE, openSUSE y Red Hat).

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-05 CVE Reserved
  • 2018-07-24 CVE Published
  • 2024-06-02 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-345: Insufficient Verification of Data Authenticity
  • CWE-354: Improper Validation of Integrity Check Value
CAPEC
References (1)
URL Tag Source
https://www.kb.cert.org/vuls/id/793496 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Quagga
Search vendor "Quagga"
Quagga
Search vendor "Quagga" for product "Quagga"
--
Affected
Suse
Search vendor "Suse"
Opensuse
Search vendor "Suse" for product "Opensuse"
--
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
--
Affected
Redhat
Search vendor "Redhat"
Package Manager
Search vendor "Redhat" for product "Package Manager"
--
Affected