Description
It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-662-1 | quagga security update |
Debian DSA |
DSA-3695-1 | quagga security update |
EUVD |
EUVD-2016-2344 | It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent. |
Ubuntu USN |
USN-3110-1 | Quagga vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T22:48:13.613Z
Reserved: 2015-12-27T00:00:00.000Z
Link: CVE-2016-1245
No data.
Status : Modified
Published: 2017-02-22T23:59:00.143
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-1245
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN