Amazon Linux AMI : quagga (ALAS-2012-70)

low Nessus Plugin ID 69677


The remote Amazon Linux AMI host is missing a security update.


Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.


Run 'yum update quagga' to update your system.

See Also

Plugin Details

Severity: Low

ID: 69677

File Name: ala_ALAS-2012-70.nasl

Version: 1.5

Type: local

Agent: unix

Published: 9/4/2013

Updated: 4/18/2018

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Low

Base Score: 3.3

Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:quagga, p-cpe:/a:amazon:linux:quagga-contrib, p-cpe:/a:amazon:linux:quagga-debuginfo, p-cpe:/a:amazon:linux:quagga-devel, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 4/30/2012

Reference Information

CVE: CVE-2012-0250

ALAS: 2012-70