The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
quagga quagga |
||
debian debian linux 9.0 |
||
debian debian linux 8.0 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 17.10 |