Debian: DSA-2316-1: quagga security update

    Date05 Oct 2011
    CategoryDebian
    34
    Posted ByLinuxSecurity Advisories
    Riku Hietamaki, Tuomo Untinen and Jukka Taimisto discovered several vulnerabilities in Quagga, an Internet routing daemon: CVE-2011-3323
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2316-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                            Florian Weimer
    October 05, 2011                       http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : quagga
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2011-3323 CVE-2011-3324 CVE-2011-3325 CVE-2011-3326 CVE-2011-3327
    
    Riku Hietamaki, Tuomo Untinen and Jukka Taimisto discovered several
    vulnerabilities in Quagga, an Internet routing daemon:
    
    CVE-2011-3323
    	A stack-based buffer overflow while decoding Link State Update
    	packets with a malformed Inter Area Prefix LSA can cause the
    	ospf6d process to crash or (potentially) execute arbitrary
    	code.
    
    CVE-2011-3324
    	The ospf6d process can crash while processing a Database
    	Description packet with a crafted Link-State-Advertisement.
    
    CVE-2011-3325
    	The ospfd process can crash while processing a crafted Hello
    	packet.
    
    CVE-2011-3326
    	The ospfd process crashes while processing
    	Link-State-Advertisements of a type not known to Quagga.
    
    CVE-2011-3327
    	A heap-based buffer overflow while processing BGP UPDATE
    	messages containing an Extended Communities path attribute
    	can cause the bgpd process to crash or (potentially) execute
    	arbitrary code.
    
    The OSPF-related vulnerabilities require that potential attackers send
    packets to a vulnerable Quagga router; the packets are not distributed
    over OSPF.  In contrast, the BGP UPDATE messages could be propagated
    by some routers.
    
    For the oldstable distribution (lenny), these problems have been fixed
    in version 0.99.10-1lenny6.
    
    For the stable distribution (squeeze), these problems have been fixed
    in version 0.99.17-2+squeeze3.
    
    For the testing distribution (wheezy) and the unstable distribution
    (sid), these problems have been fixed in version 0.99.19-1.
    
    We recommend that you upgrade your quagga packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"3","type":"x","order":"3","pct":21.43,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.