Red Hat Bugzilla – Bug 1472873
CVE-2017-3224 quagga: OSPF implementation improperly determines LSA recency (VU#793496)
Last modified: 2017-08-07 21:26:44 EDT
Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same, it is possible with vulnerable OSPF implementations for an attacker to craft a LSA with invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. Attackers with the ability to transmit messages from a routing domain router may send specially crafted OSPF messages to erase or alter the routing tables of routers within the domain, resulting in denial of service or the re-routing of traffic on the network.
Acknowledgments: Name: CERT Upstream: Adi Sosnovich, Orna Grumberg, Gabi Nakibly
Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CERT advisory: http://www.kb.cert.org/vuls/id/793496
Created quagga tracking bugs for this issue: Affects: fedora-all [bug 1476075]
External References: https://www.kb.cert.org/vuls/id/793496