Quagga < Multiple Vulnerabilities

medium Nessus Plugin ID 59791
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote service may be affected by multiple vulnerabilities.


According to its self-reported version number, the installation of Quagga listening on the remote host is affected by multiple vulnerabilities :

- A buffer overflow vulnerability exists in OSPFD can be triggered by a specially crafted Link Status Update message that is smaller than the length specified in its header, leading to denial of service.

- A buffer overflow vulnerability in exists OSPFD can be triggered by a specially crafted Link Status Update message containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field, leading to denial of service. (CVE-2012-0250)

- A denial of service vulnerability exists in BGPD that can be triggered by a specially crafted OPEN message with a malformed four-octet AS Number Capability.


Upgrade to version or later.

See Also




Plugin Details

Severity: Medium

ID: 59791

File Name: quagga_0_99_20_1.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 6/29/2012

Updated: 7/25/2018

Dependencies: quagga_zebra_detect.nasl

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:quagga:quagga

Required KB Items: Quagga/Installed, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 3/8/2012

Vulnerability Publication Date: 1/16/2012

Reference Information

CVE: CVE-2012-0249, CVE-2012-0250, CVE-2012-0255

BID: 52531

CERT: 551715