Debian DSA-2104-1 : quagga - several vulnerabilities

medium Nessus Plugin ID 49121

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Several remote vulnerabilities have been discovered in the BGP implementation of Quagga, a routing daemon.

The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2010-2948 When processing a crafted Route Refresh message received from a configured, authenticated BGP neighbor, Quagga may crash, leading to a denial of service.

- CVE-2010-2949 When processing certain crafted AS paths, Quagga would crash with a NULL pointer dereference, leading to a denial of service. In some configurations, such crafted AS paths could be relayed by intermediate BGP routers.

In addition, this update contains a reliability fix: Quagga will no longer advertise confederation-related AS paths to non-confederation peers, and reject unexpected confederation-related AS paths by resetting the session with the BGP peer which is advertising them.
(Previously, such AS paths would trigger resets of unrelated BGP sessions.)

Solution

Upgrade the quagga package.

For the stable distribution (lenny), these problems have been fixed in version 0.99.10-1lenny3.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594262

https://security-tracker.debian.org/tracker/CVE-2010-2948

https://security-tracker.debian.org/tracker/CVE-2010-2949

https://www.debian.org/security/2010/dsa-2104

Plugin Details

Severity: Medium

ID: 49121

File Name: debian_DSA-2104.nasl

Version: 1.13

Type: local

Agent: unix

Published: 9/8/2010

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:quagga, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 9/6/2010

Reference Information

CVE: CVE-2010-2948, CVE-2010-2949

BID: 42635, 42642

DSA: 2104