A stack buffer overflow flaw was found in the way Quagga's bgpd daemon processed Route-Refresh messages. A configured Border Gateway Protocol (BGP) peer could send a Route-Refresh message with specially-crafted Outbound Route Filtering (ORF) record, which would cause the master BGP daemon (bgpd) to crash or, possibly, execute arbitrary code with the privileges of the user running bgpd. Upstream changeset: [1] http://code.quagga.net/?p=quagga.git;a=commit;h=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3 References: [2] http://www.quagga.net/news2.php?y=2010&m=8&d=19#id1282241100 CVE request: [3] http://www.openwall.com/lists/oss-security/2010/08/24/3
This issue affects the versions of the quagga package, as shipped with Red Hat Enterprise Linux 3, 4, and 5. -- This issue affects the versions of the quagga package, as shipped with Fedora release of 12 and 13.
Created quagga tracking bugs for this issue Affects: fedora-all [bug 628981]
Statement: This issue is not planned to be fixed in Red Hat Enterprise Linux 3 due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed. For further information about the Errata Support Policy, visit: http://www.redhat.com/security/updates/errata A future update in Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5 may address this flaw.
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2010:0785 https://rhn.redhat.com/errata/RHSA-2010-0785.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2010:0945 https://rhn.redhat.com/errata/RHSA-2010-0945.html