quagga-0.98.6-7.1.0.1.AXS3
エラータID: AXSA:2012-930:01
Quagga is a free software that manages TCP/IP based routing protocol. It takes multi-server and multi-thread approach to resolve the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is not a toolkit, it provides full routing power under a new architecture. Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
Security issues fixed with this release:
• CVE-2010-1674
The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
• CVE-2011-3323
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
• CVE-2011-3324
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
• CVE-2011-3325
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
• CVE-2011-3326
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
• CVE-2011-3327
Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
• CVE-2012-0249
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
• CVE-2012-0250
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
Update packages.
The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
N/A
SRPMS
- quagga-0.98.6-7.1.0.1.AXS3.src.rpm
MD5: 90a49e6b88b936b8a2085dba0a4e3ea6
SHA-256: cbd9a5daeac495dd2073645ece4c89a0f08f832cf83e12e73c96fa5324255cd2
Size: 1.97 MB
Asianux Server 3 for x86
- quagga-0.98.6-7.1.0.1.AXS3.i386.rpm
MD5: 767356a154d48fc6f6f9e4087500a972
SHA-256: 70db72706de43522a7c7b836a937ba8e72634869c2dec871774c9a375b78d11c
Size: 1.10 MB - quagga-contrib-0.98.6-7.1.0.1.AXS3.i386.rpm
MD5: c6dd4dada789da31b22930585b4286e0
SHA-256: 992aaecc219a6408b3896180cf9122350961e695fef13ac12277f28afd6b4831
Size: 15.13 kB - quagga-devel-0.98.6-7.1.0.1.AXS3.i386.rpm
MD5: 74f6e159e0994277caf3d24afc6df63d
SHA-256: dc7454b1295d565f104f54d34ab4150635578d90bac759ee4b08708f961f6e31
Size: 456.93 kB
Asianux Server 3 for x86_64
- quagga-0.98.6-7.1.0.1.AXS3.x86_64.rpm
MD5: 257f406b101d083fa32c901d835fba2b
SHA-256: 77ddd0c4d3ea4855aa01042278ce945bd03b6731eec85cedae7d2ce9f8ea4365
Size: 1.13 MB - quagga-contrib-0.98.6-7.1.0.1.AXS3.x86_64.rpm
MD5: 1d547c89ecb5308b1957c4f37260a0b8
SHA-256: f744233341a98507794afb4da2a532f89d5e615bc54c25210eb9abda0ac5f556
Size: 15.09 kB - quagga-devel-0.98.6-7.1.0.1.AXS3.x86_64.rpm
MD5: d50d0026298a1e5c7f2e57cd3bd2bbea
SHA-256: 2db625bedf9b58c25da4f144d092a2e4833e382df8e671f13c26835d7b749c63
Size: 465.27 kB