4.9
CVSSv2

CVE-2006-2276

Published: 10/05/2006 Updated: 03/10/2018
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

bgpd in Quagga 0.98 and 0.99 prior to 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.

Vulnerable Product Search on Vulmon Subscribe to Product

quagga quagga 0.98.5

quagga quagga 0.99.3

Vendor Advisories

Paul Jakma discovered that Quagga’s ripd daemon did not properly handle authentication of RIPv1 requests If the RIPv1 protocol had been disabled, or authentication for RIPv2 had been enabled, ripd still replied to RIPv1 requests, which could lead to information disclosure (CVE-2006-2223) ...
Debian Bug report logs - #366980 CVE-2006-2276: bgpd denial of service in bgpd telnet interface Package: quagga; Maintainer for quagga is Brett Parker <iDunno@sommitrealweirdcouk>; Source for quagga is src:quagga (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Fri, 12 May 2006 16:18:11 UTC ...
Debian Bug report logs - #365940 SECURITY: Quagga RIPD unauthenticated route injection Package: quagga; Maintainer for quagga is Brett Parker <iDunno@sommitrealweirdcouk>; Source for quagga is src:quagga (PTS, buildd, popcon) Reported by: Christian Hammers <ch@debianorg> Date: Wed, 3 May 2006 20:48:31 UTC Severi ...
Konstantin Gavrilenko discovered several vulnerabilities in quagga, the BGP/OSPF/RIP routing daemon The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2006-2223 Remote attackers may obtain sensitive information via RIPv1 REQUEST packets even if the quagga has been configured to use MD5 authenticati ...