Overview
Quagga contains five remote component vulnerabilities due to issues when handling BGP, OSPF, and OSPFv3 packets.
Description
CERT-FI reports: Quagga is an open source routing software that can handle various routing protocols such as RIP, BGP and OSPF. Five vulnerabilities have been found in the BGP, OSPF and OSPFv3 components of Quagga. The vulnerabilities allow an attacker to cause a denial of service or potentially to execute his own code by sending a specially modified packets to an affected server. Routing messages are typically accepted from the routing peers. Exploiting these vulnerabilities may require an established routing session (BGP peering or OSPF/OSPFv3 adjacency) to the router. |
Impact
An attacker could exploit these vulnerabilities to cause a denial-of-service crash or may execute arbitrary code on the affected server with the permissions of the Quagga software. |
Solution
CERT-FI recommends: |
Vendor Information
Quagga before version 0.99.19 |
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Riku Hietamäki, Tuomo Untinen and Jukka Taimisto of the Codenomicon CROSS project for reporting this vulnerability to CERT-FI.
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, CVE-2011-3326, CVE-2011-3327 |
Severity Metric: | 15.69 |
Date Public: | 2011-09-26 |
Date First Published: | 2011-09-26 |
Date Last Updated: | 2011-10-06 11:24 UTC |
Document Revision: | 10 |