Quagga

Quagga

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.2%
  • Veröffentlicht 19.11.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:30:16

An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update.

  • EPSS 0.33%
  • Veröffentlicht 25.11.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 01:44:48

quagga (ospf6d) 0.99.21 has a DoS flaw in the way the ospf6d daemon performs routes removal

  • EPSS 0.03%
  • Veröffentlicht 24.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:25:04

Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by ...

  • EPSS 10.09%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:42

The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Proto...

  • EPSS 1.4%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:42

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.

  • EPSS 14.84%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:41

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an...

  • EPSS 3.72%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:41

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may c...

  • EPSS 1.46%
  • Veröffentlicht 29.10.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequent...

  • EPSS 1.19%
  • Veröffentlicht 22.02.2017 23:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BU...

  • EPSS 3.62%
  • Veröffentlicht 24.01.2017 07:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI ...