Quagga < Multiple Vulnerabilities

medium Nessus Plugin ID 59791


The remote service may be affected by multiple vulnerabilities.


According to its self-reported version number, the installation of Quagga listening on the remote host is affected by multiple vulnerabilities :

- A buffer overflow vulnerability exists in OSPFD can be triggered by a specially crafted Link Status Update message that is smaller than the length specified in its header, leading to denial of service.

- A buffer overflow vulnerability in exists OSPFD can be triggered by a specially crafted Link Status Update message containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field, leading to denial of service. (CVE-2012-0250)

- A denial of service vulnerability exists in BGPD that can be triggered by a specially crafted OPEN message with a malformed four-octet AS Number Capability.


Upgrade to version or later.

See Also




Plugin Details

Severity: Medium

ID: 59791

File Name: quagga_0_99_20_1.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 6/29/2012

Updated: 7/25/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 4.2


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:quagga:quagga

Required KB Items: Quagga/Installed, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 3/8/2012

Vulnerability Publication Date: 1/16/2012

Reference Information

CVE: CVE-2012-0249, CVE-2012-0250, CVE-2012-0255

BID: 52531

CERT: 551715