quagga-0.99.15-7.AXS4.2

エラータID: AXSA:2012-989:01

Release date: 
Tuesday, December 11, 2012 - 12:56
Subject: 
quagga-0.99.15-7.AXS4.2
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

Quagga is a free software that manages TCP/IP based routing protocol. It takes multi-server and multi-thread approach to resolve the current complexity of the Internet.

Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.

Quagga is intended to be used as a Route Server and a Route Reflector. It is not a toolkit, it provides full routing power under a new architecture. Quagga by design has a process for each protocol.

Quagga is a fork of GNU Zebra.

Security issues fixed with this release:

• CVE-2011-3323
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.

• CVE-2011-3324
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.

• CVE-2011-3325
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.

• CVE-2011-3326
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.

• CVE-2011-3327
Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.

• CVE-2012-0249
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.

• CVE-2012-0250
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.

• CVE-2012-0255
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).

• CVE-2012-1820
The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. quagga-0.99.15-7.AXS4.2.src.rpm
    MD5: 1350dd62b5cd262c6167b814418a017f
    SHA-256: 4932033f897dd879d662cce47b54d747fa629f9544bc9b0ad87440312c1e25f3
    Size: 2.14 MB

Asianux Server 4 for x86
  1. quagga-0.99.15-7.AXS4.2.i686.rpm
    MD5: 41a55ebc17b6e88f6279c38ecd3a2bb8
    SHA-256: 121e95140f753b0d969f8c2b7274846eb04b11e42babecd4c47e438ea0f9aae4
    Size: 1.03 MB

Asianux Server 4 for x86_64
  1. quagga-0.99.15-7.AXS4.2.x86_64.rpm
    MD5: 9edbc2994f586ea82234bdb2ae88b178
    SHA-256: d94029d9bf31f50d37ee78eda24d68c9735549dc40db771a4d8024b23bdef22e
    Size: 1.06 MB