Quagga 0.99.21 bgp_attr.c BGP Update DoS

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote service may be affected by a denial of service
vulnerability.

Description :

According to its self-reported version number, the installation of
Quagga's BGP daemon listening on the remote host is affected by a denial
of service vulnerability. This issue exists due to a failure to
properly initialize the packet's total size variable in the 'bgp_attr.c'
source file. Normal, valid BGP update messages can trigger this
issue.

See also :

https://savannah.nongnu.org/forum/forum.php?forum_id=7501
http://www.nessus.org/u?11e41901
http://www.nessus.org/u?d4828438
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730513

Solution :

Upgrade to version 0.99.22 or later.

Risk factor :

Low / CVSS Base Score : 2.9
(CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 2.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 71536 ()

Bugtraq ID: 63937

CVE ID: CVE-2013-6051