Quagga < 0.99.17 BGPD Multiple Vulnerabilities

medium Nessus Plugin ID 59788

Synopsis

The remote service may be affected by multiple vulnerabilities.

Description

According to its self-reported version number, the installation of Quagga's BGPD listening on the remote host is affected by multiple vulnerabilities :

- A stack-based buffer overflow vulnerability can be triggered by a specially crafted BGP ROUTE-REFRESH message with a malformed Outbound Route Filtering record sent by a pre-configured peer. (CVE-2010-2948)

- A denial of service vulnerability in BGPD can be triggered by a specially crafted UPDATE message with an unknown AS type in an AS path attribute.
(CVE-2012-0250)

Solution

Upgrade to version 0.99.17 or later.

See Also

http://web.archive.org/web/20110928221629/http://www.quagga.net/download/quagga-0.99.17.changelog.txt

http://savannah.nongnu.org/forum/forum.php?forum_id=7140

Plugin Details

Severity: Medium

ID: 59788

File Name: quagga_0_99_17.nasl

Version: 1.8

Type: remote

Family: Misc.

Published: 6/29/2012

Updated: 12/4/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2010-2948

Vulnerability Information

CPE: cpe:/a:quagga:quagga

Required KB Items: Quagga/Installed, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 8/19/2010

Vulnerability Publication Date: 8/24/2010

Reference Information

CVE: CVE-2010-2948, CVE-2010-2949

BID: 42635, 42642