SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Quagga Vendors:   quagga.net
Quagga bgpd bgp_dump_routes_func() Lets Remote Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1035699
SecurityTracker URL:  http://securitytracker.com/id/1035699
CVE Reference:   CVE-2016-4049   (Links to External Site)
Date:  Apr 28 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Quagga. A remote user can cause the target service to crash.

The bgp_dump_routes_func() in 'bgpd/bgp_dump.c' does not check the size of data dumps written to bgp_dump_obuf. On systems where dumping is enabled and where the BGP daemon has a large number of BGP peers, a remote user can send a specially crafted BGP message to trigger an error in bgp_dump_routes_func() and cause the target bgpd service to crash.

Evgeny Uskov reported this vulnerability.

Impact:   A remote user can cause the target bgpd service to crash.
Solution:   The vendor has issued a proposed source code fix, available at:

https://lists.quagga.net/pipermail/quagga-dev/2016-January/014699.html

Vendor URL:  www.nongnu.org/quagga/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 8 2017 (Red Hat Issues Fix for Quagga) Quagga bgpd bgp_dump_routes_func() Lets Remote Users Cause the Target Service to Crash
Red Hat has issued a fix for Quagga for Red Hat Enterprise Linux 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC