5
CVSSv2

CVE-2012-0255

Published: 05/04/2012 Updated: 18/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The BGP implementation in bgpd in Quagga prior to 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

quagga quagga 0.99.9

quagga quagga 0.99.1

quagga quagga 0.99.6

quagga quagga 0.99.10

quagga quagga 0.99.14

quagga quagga 0.98.2

quagga quagga 0.98.3

quagga quagga 0.97.5

quagga quagga 0.96.5

quagga quagga

quagga quagga 0.99.11

quagga quagga 0.99.7

quagga quagga 0.99.3

quagga quagga 0.99.15

quagga quagga 0.98.0

quagga quagga 0.98.1

quagga quagga 0.97.3

quagga quagga 0.97.4

quagga quagga 0.96

quagga quagga 0.95

quagga quagga 0.99.19

quagga quagga 0.99.18

quagga quagga 0.99.2

quagga quagga 0.99.8

quagga quagga 0.99.12

quagga quagga 0.99.4

quagga quagga 0.98.4

quagga quagga 0.97.0

quagga quagga 0.96.4

quagga quagga 0.96.2

quagga quagga 0.99.5

quagga quagga 0.99.17

quagga quagga 0.99.13

quagga quagga 0.99.16

quagga quagga 0.98.5

quagga quagga 0.98.6

quagga quagga 0.97.1

quagga quagga 0.97.2

quagga quagga 0.96.3

quagga quagga 0.96.1

Vendor Advisories

Synopsis Moderate: quagga security update Type/Severity Security Advisory: Moderate Topic Updated quagga packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability ...
Quagga could be made to crash if it received specially crafted network traffic ...
Several vulnerabilities have been discovered in Quagga, a routing daemon CVE-2012-0249 A buffer overflow in the ospf_ls_upd_list_lsa function in the OSPFv2 implementation allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than ...