Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1286-1 | quagga security update |
Debian DSA |
DSA-4115-1 | quagga security update |
EUVD |
EUVD-2018-17150 | The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash. |
Ubuntu USN |
USN-3573-1 | Quagga vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-16T20:16:44.677Z
Reserved: 2018-01-12T00:00:00.000Z
Link: CVE-2018-5378
No data.
Status : Modified
Published: 2018-02-19T13:29:00.317
Modified: 2024-11-21T04:08:41.850
Link: CVE-2018-5378
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN