RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251
http://www.securityfocus.com/archive/1/432856/100/0/threaded
http://www.securityfocus.com/archive/1/432823/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2006-0533.html
http://www.redhat.com/support/errata/RHSA-2006-0525.html
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
http://www.debian.org/security/2006/dsa-1059
http://securitytracker.com/id?1016204
http://secunia.com/advisories/21159
http://secunia.com/advisories/20782
http://secunia.com/advisories/20421
http://secunia.com/advisories/20420
http://secunia.com/advisories/20221
http://secunia.com/advisories/20138
http://secunia.com/advisories/20137