USN-1261-1: Quagga vulnerabilities

Publication date

14 November 2011

Overview

Quagga could be made to crash or run programs if it received specially crafted network traffic.


Packages

  • quagga - BGP/OSPF/RIP routing daemon

Details

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled Link State Update messages with invalid lengths. A
remote attacker could use this flaw to cause Quagga to crash, resulting in
a denial of service. (CVE-2011-3323)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled certain IPv6 Database Description messages. A remote
attacker could use this flaw to cause Quagga to crash, resulting in a
denial of service. (CVE-2011-3324)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled certain IPv4 packets. A remote attacker could use this
flaw to cause Quagga to crash, resulting in a denial of service.
(CVE-2011-3325)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly...

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled Link State Update messages with invalid lengths. A
remote attacker could use this flaw to cause Quagga to crash, resulting in
a denial of service. (CVE-2011-3323)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled certain IPv6 Database Description messages. A remote
attacker could use this flaw to cause Quagga to crash, resulting in a
denial of service. (CVE-2011-3324)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled certain IPv4 packets. A remote attacker could use this
flaw to cause Quagga to crash, resulting in a denial of service.
(CVE-2011-3325)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled invalid Link State Advertisement (LSA) types. A remote
attacker could use this flaw to cause Quagga to crash, resulting in a
denial of service. (CVE-2011-3326)

Riku Hietamäki, Tuomo Untinen and Jukka Taimisto discovered that Quagga
incorrectly handled certain BGP UPDATE messages. A remote attacker could
use this flaw to cause Quagga to crash, or possibly execute arbitrary
code. (CVE-2011-3327)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
11.10 oneiric quagga –  0.99.18-2ubuntu0.1
11.04 natty quagga –  0.99.17-4ubuntu1.1
10.10 maverick quagga –  0.99.17-1ubuntu0.2
10.04 lucid quagga –  0.99.15-1ubuntu0.3

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›