Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN284-1 : quagga vulnerabilities


Vulnerability Assessment Details

USN284-1 : quagga vulnerabilities

Vulnerability Assessment Summary
quagga vulnerabilities

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- quagga
- quagga-doc


Description :

Paul Jakma discovered that Quagga's ripd daemon did not properly
handle authentication of RIPv1 requests. If the RIPv1 protocol had
been disabled, or authentication for RIPv2 had been enabled, ripd
still replied to RIPv1 requests, which could lead to information
disclosure. (CVE-2006-2223)

Paul Jakma also noticed that ripd accepted unauthenticated RIPv1
response packets if RIPv2 was configured to require authentication and
both protocols were permited. A remote attacker could exploit this to
inject arbitrary routes. (CVE-2006-2224)

Fredrik Widell discovered that Quagga did not properly handle certain
invalid 'sh ip bgp' commands. By sending special commands to Quagga, a
remote attacker with telnet access to the Quagga server could exploit
this to trigger an endless loop in the daemon (Denial of Service).
(CVE-2006-2276)

Solution :

Upgrade to :
- quagga-0.99.1-1ubuntu1.1 (Ubuntu 5.10)
- quagga-doc-0.99.1-1ubuntu1.1 (Ubuntu 5.10)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

HP Proliant BL680c G5 4 x X7450 2.4GHz Six-Core 128GB RAM NO HDD/OS
$100.0
HP Proliant BL680c G5 4 x X7450 2.4GHz Six-Core 128GB RAM NO HDD/OS pictureDELL POWEREDGE M620 BLADE TWO E5-2650LV2 1.70GHZ 16GB 600GB 10K SAS H310
$1039.0
DELL POWEREDGE M620 BLADE TWO E5-2650LV2 1.70GHZ 16GB 600GB 10K SAS H310 picture29-O HP ProLiant BL460c G6 Blade Server 2x Xeon X5650 6-Core 2.66GHz NO RAM
$74.99
29-O HP ProLiant BL460c G6 Blade Server 2x Xeon X5650 6-Core 2.66GHz NO RAM picture29-N HP ProLiant BL460c G6 Blade Server 2x Xeon X5650 6-Core 2.66GHz NO RAM
$39.99
29-N HP ProLiant BL460c G6 Blade Server 2x Xeon X5650 6-Core 2.66GHz NO RAM picture


Discussions

No Discussions have been posted on this vulnerability.