Quagga < 0.99.20.1 Multiple Vulnerabilities

medium Nessus Plugin ID 59791

Synopsis

The remote service may be affected by multiple vulnerabilities.

Description

According to its self-reported version number, the installation of Quagga listening on the remote host is affected by multiple vulnerabilities :

- A buffer overflow vulnerability exists in OSPFD can be triggered by a specially crafted Link Status Update message that is smaller than the length specified in its header, leading to denial of service.
(CVE-2012-0249)

- A buffer overflow vulnerability in exists OSPFD can be triggered by a specially crafted Link Status Update message containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field, leading to denial of service. (CVE-2012-0250)

- A denial of service vulnerability exists in BGPD that can be triggered by a specially crafted OPEN message with a malformed four-octet AS Number Capability.
(CVE-2012-0250)

Solution

Upgrade to version 0.99.20.1 or later.

See Also

https://bugzilla.quagga.net/show_bug.cgi?id=705

http://savannah.nongnu.org/forum/forum.php?forum_id=7151

http://www.quagga.net/download/quagga-0.99.20.1.changelog.txt

Plugin Details

Severity: Medium

ID: 59791

File Name: quagga_0_99_20_1.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 6/29/2012

Updated: 7/25/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:quagga:quagga

Required KB Items: Quagga/Installed, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 3/8/2012

Vulnerability Publication Date: 1/16/2012

Reference Information

CVE: CVE-2012-0249, CVE-2012-0250, CVE-2012-0255

BID: 52531

CERT: 551715