Quagga < 0.98.6 / 0.99.4 Multiple Vulnerabilities

medium Nessus Plugin ID 59793

Synopsis

The remote service may be affected by multiple vulnerabilities.

Description

According to its self-reported version number, the installation of Quagga listening on the remote host is affected by multiple vulnerabilities :

- An information disclosure vulnerability in RIPD can be triggered by a REQUEST packet, such as SEND UPDATE, on hosts that disable RIPv1 or require plaintext or MD5 authentication. (CVE-2006-2223)

- An authentication bypass vulnerability in RIPD may allow unauthenticated, remote attackers to modify routing state via RIPv1 RESPONSE packets. (CVE-2006-2224)

- A denial of service vulnerability in Zebra can be triggered by a certain BGP command. (CVE-2006-2276)

Solution

Upgrade to version 0.98.6 / 0.99.4 or later.

See Also

http://bugzilla.quagga.net/show_bug.cgi?id=261

http://bugzilla.quagga.net/show_bug.cgi?id=262

http://web.archive.org/web/20090109131143/http://www.quagga.net/download/attic/quagga-0.99.4.changelog.txt

https://lists.quagga.net/pipermail/quagga-dev/2006-March/004052.html

https://seclists.org/fulldisclosure/2006/May/32

Plugin Details

Severity: Medium

ID: 59793

File Name: quagga_0_99_4.nasl

Version: 1.8

Type: remote

Family: Misc.

Published: 6/29/2012

Updated: 12/4/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2006-2224

Vulnerability Information

CPE: cpe:/a:quagga:quagga

Required KB Items: Quagga/Installed, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/30/2006

Vulnerability Publication Date: 5/3/2006

Reference Information

CVE: CVE-2006-2223, CVE-2006-2224, CVE-2006-2276

BID: 17808, 17979