Quagga RIPd route injection RIPd in Quagga accepts RIPv1 RESPONSE when RIPv2 authentication is enabled. This condition is possible unless RIPv2 only is specified in the RIPd configuration. This flaw could allow a remote attacker to inject a route via RIPv1 RESPONSE packets. http://bugzilla.quagga.net/show_bug.cgi?id=262 This issue also affects RHEL3
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0525.html