Quagga

Quagga

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.16%
  • Veröffentlicht 23.05.2016 19:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.

  • EPSS 20.44%
  • Veröffentlicht 17.03.2016 14:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remo...

  • EPSS 0.43%
  • Veröffentlicht 14.12.2013 17:21:46
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The bgp_attr_unknown function in bgp_attr.c in Quagga 0.99.21 does not properly initialize the total variable, which allows remote attackers to cause a denial of service (bgpd crash) via a crafted BGP update.

  • EPSS 0.96%
  • Veröffentlicht 24.10.2013 03:48:46
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (cr...

  • EPSS 0.19%
  • Veröffentlicht 13.06.2012 15:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering...

  • EPSS 0.25%
  • Veröffentlicht 05.04.2012 13:25:30
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for ...

  • EPSS 1.04%
  • Veröffentlicht 05.04.2012 13:25:30
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malforme...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 05.04.2012 13:25:30
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (a...

  • EPSS 21.55%
  • Veröffentlicht 10.10.2011 10:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE...

  • EPSS 7.57%
  • Veröffentlicht 10.10.2011 10:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.