Buffer overflow in the OSPFv2 implementation in ospfd in Quagga prior to 0.99.20.1 allows remote malicious users to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
quagga quagga |
||
quagga quagga 0.99.13 |
||
quagga quagga 0.99.12 |
||
quagga quagga 0.99.15 |
||
quagga quagga 0.99.14 |
||
quagga quagga 0.99.7 |
||
quagga quagga 0.99.6 |
||
quagga quagga 0.99.5 |
||
quagga quagga 0.99.4 |
||
quagga quagga 0.99.19 |
||
quagga quagga 0.99.18 |
||
quagga quagga 0.99.11 |
||
quagga quagga 0.99.10 |
||
quagga quagga 0.99.3 |
||
quagga quagga 0.99.2 |
||
quagga quagga 0.99.17 |
||
quagga quagga 0.99.16 |
||
quagga quagga 0.99.9 |
||
quagga quagga 0.99.8 |
||
quagga quagga 0.99.1 |