Bug 802827 (CVE-2012-0249) - CVE-2012-0249 quagga (ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet
Summary: CVE-2012-0249 quagga (ospfd): Assertion failure due improper length check for...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0249
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 808357 845163 845526 845528 845529
Blocks: 738408
TreeView+ depends on / blocked
 
Reported: 2012-03-13 15:19 UTC by Jan Lieskovsky
Modified: 2023-05-13 01:05 UTC (History)
3 users (show)

Fixed In Version: quagga 0.99.20.1
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-09-13 12:09:33 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1258 0 normal SHIPPED_LIVE Moderate: quagga security update 2012-09-13 00:02:35 UTC
Red Hat Product Errata RHSA-2012:1259 0 normal SHIPPED_LIVE Moderate: quagga security update 2012-09-13 00:00:43 UTC

Description Jan Lieskovsky 2012-03-13 15:19:52 UTC
An assertion failure was found in the way Quagga's ospfd daemon processed certain OSPF LS-Update packets. An adjacent OSPF router could send a specially-crafted OSPF Link State Update (LS-Update) packet, which once processed would cause the vulnerable ospfd daemon to abort (denial of service).

Upstream bug report:
[1] https://bugzilla.quagga.net/show_bug.cgi?id=705

Upstream patches:
[2]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=393b2d64dc0625ba8e01e9e1516efac06d13072e
[3]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=099ed6744881e71957f2bfeebc4c0727714d2394
[4]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=3092cd57fb44c8293995d013bd86937d1a91745f
[5]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=3779a3bf9d27b3cccda7e45223884257af362c28
[6]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=7edfc01207f3eee8f26d5c22cfef7c7f030c52ce
[7]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=fba10fc38f482c617fdfbb81b8d855df56eeda51
[8]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=b03ae9f2d22acd8e3f97714a9c0df744676e344d
[9]  http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=1bdd96caefaa76883bece4d358a60dc890f1e375
[10] http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=e5fa148725fb2a3d1a8df12683f023ff9d65273f
[11] http://git.savannah.gnu.org/cgit/quagga.git/commit/?h=security/0.99.20&id=a59c5401a2df169de2c780f13a4563548c04a2b7

Comment 4 Jan Lieskovsky 2012-03-30 08:54:46 UTC
Public via:
http://www.kb.cert.org/vuls/id/551715

Comment 5 Jan Lieskovsky 2012-03-30 08:58:18 UTC
Created quagga tracking bugs for this issue

Affects: fedora-all [bug 808357]

Comment 6 Fedora Update System 2012-04-20 03:07:04 UTC
quagga-0.99.20.1-1.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2012-04-22 03:43:24 UTC
quagga-0.99.20.1-1.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2012-04-22 03:48:23 UTC
quagga-0.99.20.1-1.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 errata-xmlrpc 2012-09-12 20:05:53 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1259 https://rhn.redhat.com/errata/RHSA-2012-1259.html

Comment 14 errata-xmlrpc 2012-09-12 20:06:27 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:1258 https://rhn.redhat.com/errata/RHSA-2012-1258.html

Comment 15 Murray McAllister 2012-09-13 02:53:56 UTC
Acknowledgements:

Red Hat would like to thank the CERT/CC for reporting this issue. The CERT/CC acknowledges Martin Winter at OpenSourceRouting.org as the original reporter.


Note You need to log in before you can comment on or make changes to this bug.