SB2017082912 - SUSE Linux update for quagga



SB2017082912 - SUSE Linux update for quagga

Published: August 29, 2017

Security Bulletin ID SB2017082912
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2016-1245)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.


2) Memory corruption (CVE-ID: CVE-2017-5495)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to unbounded memory allocation in the telnet 'vty' CLI. A remote attacker able to connect to the TCP ports can  send very long strings without a newline, cause the Quagga daemon to allocate unbounded memory and system crash.

Remediation

Install update from vendor's website.