Vulnerability identifier: #VU44627
Vulnerability risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Quagga
Server applications /
Other server solutions
Vendor: quagga.net
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Quagga: 0.95 - 0.99.17
External links
http://code.quagga.net/?p=quagga.git;a=commit;h=09395e2a0e93b2cf4258cb1de91887948796bb68
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
http://rhn.redhat.com/errata/RHSA-2012-1258.html
http://rhn.redhat.com/errata/RHSA-2012-1259.html
http://secunia.com/advisories/46139
http://secunia.com/advisories/46274
http://secunia.com/advisories/48106
http://security.gentoo.org/glsa/glsa-201202-02.xml
http://www.debian.org/security/2011/dsa-2316
http://www.kb.cert.org/vuls/id/668534
http://www.quagga.net/download/quagga-0.99.19.changelog.txt
http://www.cert.fi/en/reports/2011/vulnerability539178.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.