Scientific Linux Security Update : quagga on SL6.x i386/x86_64
Medium Nessus Plugin ID 60914
SynopsisThe remote Scientific Linux host is missing one or more security updates.
DescriptionA stack-based buffer overflow flaw was found in the way the Quagga bgpd daemon processed certain BGP Route Refresh (RR) messages. A configured BGP peer could send a specially crafted BGP message, causing bgpd on a target system to crash or, possibly, execute arbitrary code with the privileges of the user running bgpd.
Note: On Scientific Linux 6 it is not possible to exploit CVE-2010-2948 to run arbitrary code as the overflow is blocked by FORTIFY_SOURCE.
A NULL pointer dereference flaw was found in the way the Quagga bgpd daemon parsed the paths of autonomous systems (AS). A configured BGP peer could crash bgpd on a target system via a specially crafted BGP message. (CVE-2010-2949)
After installing the updated packages, the bgpd daemon must be restarted for the update to take effect.
SolutionUpdate the affected quagga, quagga-contrib and / or quagga-devel packages.