Bug 626783 (CVE-2010-2948) - CVE-2010-2948 Quagga (bgpd): Stack buffer overflow by processing certain Route-Refresh messages
Summary: CVE-2010-2948 Quagga (bgpd): Stack buffer overflow by processing certain Rout...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-2948
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 628981 638624 638626 638627 638628 644830 644832 833977
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-08-24 12:11 UTC by Jan Lieskovsky
Modified: 2021-02-24 22:34 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-06-20 13:41:59 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0785 0 normal SHIPPED_LIVE Moderate: quagga security update 2010-10-20 16:24:08 UTC
Red Hat Product Errata RHSA-2010:0945 0 normal SHIPPED_LIVE Moderate: quagga security update 2010-12-06 19:21:22 UTC

Description Jan Lieskovsky 2010-08-24 12:11:03 UTC
A stack buffer overflow flaw was found in the way Quagga's bgpd daemon
processed Route-Refresh messages. A configured Border Gateway Protocol
(BGP) peer could send a Route-Refresh message with specially-crafted
Outbound Route Filtering (ORF) record, which would cause the master BGP
daemon (bgpd) to crash or, possibly, execute arbitrary code with the
privileges of the user running bgpd.

Upstream changeset:
  [1] http://code.quagga.net/?p=quagga.git;a=commit;h=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3

References:
  [2] http://www.quagga.net/news2.php?y=2010&m=8&d=19#id1282241100

CVE request:
  [3] http://www.openwall.com/lists/oss-security/2010/08/24/3

Comment 4 Jan Lieskovsky 2010-08-24 12:20:15 UTC
This issue affects the versions of the quagga package, as shipped
with Red Hat Enterprise Linux 3, 4, and 5.

--

This issue affects the versions of the quagga package, as shipped
with Fedora release of 12 and 13.

Comment 7 Jan Lieskovsky 2010-08-31 15:09:27 UTC
Created quagga tracking bugs for this issue

Affects: fedora-all [bug 628981]

Comment 16 Jan Lieskovsky 2010-09-24 16:37:05 UTC
Statement:

This issue is not planned to be fixed in Red Hat Enterprise Linux 3
due to this product being in Production 3 of its maintenance
life-cycle, where only qualified security errata of important and
critical impact are addressed.

For further information about the Errata Support Policy, visit:
http://www.redhat.com/security/updates/errata

A future update in Red Hat Enterprise Linux 4 and
Red Hat Enterprise Linux 5 may address this flaw.

Comment 19 errata-xmlrpc 2010-10-20 16:24:15 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0785 https://rhn.redhat.com/errata/RHSA-2010-0785.html

Comment 23 errata-xmlrpc 2010-12-06 19:21:28 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2010:0945 https://rhn.redhat.com/errata/RHSA-2010-0945.html


Note You need to log in before you can comment on or make changes to this bug.