CVE Reference: CVE-2010-2948

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2010-2948

Description:
Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/USN-1027-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
  http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html

SAID
  Secunia Advisory: SA41038
  Secunia Advisory: SA41238
  Secunia Advisory: SA42397
  Secunia Advisory: SA42446
  Secunia Advisory: SA42498

REDHAT
  http://www.redhat.com/support/errata/RHSA-2010-0945.html
  http://www.redhat.com/support/errata/RHSA-2010-0785.html

MLIST
  http://www.openwall.com/lists/oss-security/2010/08/25/4
  http://www.openwall.com/lists/oss-security/2010/08/24/3

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2010:174

DEBIAN
  http://www.debian.org/security/2010/dsa-2104

CONFIRM
  http://www.quagga.net/news2.php?y=2010&m=8&d=19
  http://code.quagga.net/?p=quagga.git;a=commit;h=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3

BID
  42635


Return to the previous page.