Bug 654603 - (CVE-2010-1674) CVE-2010-1674 quagga: DoS (crash) by processing malformed extended community attribute in a route
CVE-2010-1674 quagga: DoS (crash) by processing malformed extended community ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
public=20110321,reported=20101117,sou...
: Security
Depends On: 684747 684748 684749 684750 684751 689852 845536 845537
Blocks:
  Show dependency treegraph
 
Reported: 2010-11-18 06:29 EST by Jan Lieskovsky
Modified: 2015-11-24 09:37 EST (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-07-29 10:49:57 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2010-11-18 06:29:27 EST
A NULL pointer dereference flaw was found in the way Quagga bgpd
daemon processed malformed route information. A configured BGP
peer could crash bgpd on a target system via a BGP message with
specially-crafted value of BGP Extended Communities attribute.
Comment 6 Jan Lieskovsky 2011-03-22 12:08:31 EDT
This issue affects the versions of the quagga package, as shipped
with Red Hat Enterprise Linux 4, 5, and 6.

--

This issue affects the versions of the quagga package, as shipped
with Fedora release of 13 and 14.
Comment 7 Jan Lieskovsky 2011-03-22 12:12:17 EDT
Updated upstream version, addressing this:

http://www.quagga.net/news2.php?y=2011&m=3&d=21#id1300723200
Comment 8 Jan Lieskovsky 2011-03-22 12:18:01 EDT
Created quagga tracking bugs for this issue

Affects: fedora-all [bug 689852]
Comment 9 Jan Lieskovsky 2011-03-22 12:21:37 EDT
Statement:

Vulnerable. This issue affects quagga packages in Red Hat Enterprise
Linux 4 and 5. The Red Hat Security Response Team has rated this issue
as having low security impact, a future update may address this flaw.
Comment 11 errata-xmlrpc 2011-03-31 11:06:17 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0406 https://rhn.redhat.com/errata/RHSA-2011-0406.html
Comment 14 errata-xmlrpc 2012-09-12 16:06:07 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:1258 https://rhn.redhat.com/errata/RHSA-2012-1258.html

Note You need to log in before you can comment on or make changes to this bug.