Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
Paul Jakma discovered that Quagga's ripd daemon did not properly
handle authentication of RIPv1 requests. If the RIPv1 protocol had
been disabled, or authentication for RIPv2 had been enabled, ripd
still replied to RIPv1 requests, which could lead to information
Paul Jakma also noticed that ripd accepted unauthenticated RIPv1
response packets if RIPv2 was configured to require authentication and
both protocols were permited. A remote attacker could exploit this to
inject arbitrary routes. (CVE-2006-2224)
Fredrik Widell discovered that Quagga did not properly handle certain
invalid 'sh ip bgp' commands. By sending special commands to Quagga, a
remote attacker with telnet access to the Quagga server could exploit
this to trigger an endless loop in the daemon (Denial of Service).
Upgrade to :
- quagga-0.99.1-1ubuntu1.1 (Ubuntu 5.10)
- quagga-doc-0.99.1-1ubuntu1.1 (Ubuntu 5.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|SuperMicro Custom 1U Intel Xeon E3-1230 v3 3.30GHz 4C 8T 16GB DDR3 4 Bay 2.5"
|DELL POWEREDGE M620 BLADE 2x 8 CORE E5-2660 2.2GHz 128GB 2x 146GB 15K SAS H310
|Intel® Xeon® Processor E5-2640 v3 20M Cache, 2.60 GHz Tested
|AMD A10-8750 AD8750YBI44JA 3.6GHz 4-Core Socket FM2+ 4M Cache APU Processor 65W
No Discussions have been posted on this vulnerability.