A denial of service flaw was found in the way Quagga's bgpd daemon processed certain OPEN messages. A configured Border Gateway Protocol (BGP) peer could send a BGP OPEN message with specially-crafted value of the Outbound Route Filtering (ORF) capability Type/Length/Value (TLV) triplet, which would cause the master BGP daemon (bgpd) to abort with an assertion failure by processing of such a message. Also, all BGP sessions established by the attacked router would be closed and its BGP routing disrupted.
This issue affects the version of the quagga package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the quagga package, as shipped with Fedora release of 15 and 16.
US-CERT Vulnerability Note VU#962587: [1] http://www.kb.cert.org/vuls/id/962587
Created quagga tracking bugs for this issue Affects: fedora-all [bug 829266]
Created attachment 589837 [details] fixing patch Attached is a copy of the original fix: https://github.com/Quagga-RE/quagga-RE/commit/790d1e263e8800bc49d0038d481591ecb4e37b88
quagga-0.99.21-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
quagga-0.99.20.1-2.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
quagga-0.99.21-2.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1259 https://rhn.redhat.com/errata/RHSA-2012-1259.html
Acknowledgements: Red Hat would like to thank the CERT/CC for reporting this issue. The CERT/CC acknowledges Denis Ovsienko as the original reporter.