diff options
author | Niels Heinen <niels@FreeBSD.org> | 2010-08-25 07:49:07 +0000 |
---|---|---|
committer | Niels Heinen <niels@FreeBSD.org> | 2010-08-25 07:49:07 +0000 |
commit | 9ac0da53ac55087ee74e8205896b8cd5f13966f0 (patch) | |
tree | 578c6d63c4071517fdaa7746981524bf0fdce8a6 /security | |
parent | 7995f7be03a8d26b9942f621c55c1191cc4b0202 (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 18035ac765a1..1b160813a709 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,44 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="167953a4-b01c-11df-9a98-0015587e2cc1"> + <topic>quagga -- stack overflow and DoS vulnerabilities</topic> + <affects> + <package> + <name>quagga</name> + <range><lt>0.99.17</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Red Hat security team reported two vulnerabilities:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2010/08/24/3"> + <p>A stack buffer overflow flaw was found in the way Quagga's bgpd + daemon processed Route-Refresh messages. A configured + Border Gateway Protocol (BGP) peer could send a + Route-Refresh message with specially-crafted Outbound + Route Filtering (ORF) record, which would cause the + master BGP daemon (bgpd) to crash or, possibly, execute + arbitrary code with the privileges of the user running + bgpd.</p> + <p>A NULL pointer dereference flaw was found in the way + Quagga's bgpd daemon parsed paths of autonomous systems + (AS). A configured BGP peer could send a BGP update AS + path request with unknown AS type, which could lead to + denial of service (bgpd daemon crash). </p> + </blockquote> + </body> + </description> + <references> + <url>http://www.openwall.com/lists/oss-security/2010/08/24/3</url> + <url>http://www.quagga.net/news2.php?y=2010&m=8&d=19#id1282241100</url> + </references> + <dates> + <discovery>2010-08-24</discovery> + <entry>2010-08-25</entry> + </dates> + </vuln> + <vuln vid="8cbf4d65-af9a-11df-89b8-00151735203a"> <topic>bugzilla -- information disclosure, denial of service</topic> <affects> |