English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56747
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-284-1 (quagga)
Summary:Ubuntu USN-284-1 (quagga)
Description:
The remote host is missing an update to quagga
announced via advisory USN-284-1.

==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected: quagga

Paul Jakma discovered that Quagga's ripd daemon did not properly
handle authentication of RIPv1 requests. If the RIPv1 protocol had
been disabled, or authentication for RIPv2 had been enabled, ripd
still replied to RIPv1 requests, which could lead to information
disclosure. (CVE-2006-2223)

Paul Jakma also noticed that ripd accepted unauthenticated RIPv1
response packets if RIPv2 was configured to require authentication and
both protocols were allowed. A remote attacker could exploit this to
inject arbitrary routes. (CVE-2006-2224)

Fredrik Widell discovered that Quagga did not properly handle certain
invalid 'sh ip bgp' commands. By sending special commands to Quagga, a
remote attacker with telnet access to the Quagga server could exploit
this to trigger an endless loop in the daemon (Denial of Service).
(CVE-2006-2276)

Solution:
The problem can be corrected by upgrading the affected package to
version 0.97.3-1ubuntu1.1 (for Ubuntu 5.04), or 0.99.1-1ubuntu1.1 (for
Ubuntu 5.10). In general, a standard system upgrade is sufficient to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-284-1

Risk factor : Medium
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2223
Bugtraq: 20060503 Quagga RIPD unauthenticated route table broadcast (Google Search)
http://www.securityfocus.com/archive/1/archive/1/432822/100/0/threaded
Bugtraq: 20060503 Re: Quagga RIPD unauthenticated route injection (Google Search)
http://www.securityfocus.com/archive/1/archive/1/432823/100/0/threaded
Debian Security Information: DSA-1059 (Google Search)
http://www.debian.org/security/2006/dsa-1059
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
http://www.redhat.com/support/errata/RHSA-2006-0525.html
http://www.redhat.com/support/errata/RHSA-2006-0533.html
SGI Security Advisory: 20060602-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
SuSE Security Announcement: SUSE-SR:2006:017 (Google Search)
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.ubuntulinux.org/support/documentation/usn/usn-284-1
BugTraq ID: 17808
http://www.securityfocus.com/bid/17808
http://www.osvdb.org/25224
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9985
http://securitytracker.com/id?1016204
http://secunia.com/advisories/19910
http://secunia.com/advisories/20137
http://secunia.com/advisories/20138
http://secunia.com/advisories/20221
http://secunia.com/advisories/20420
http://secunia.com/advisories/20421
http://secunia.com/advisories/20782
http://secunia.com/advisories/21159
XForce ISS Database: quagga-ripv1-information-disclosure(26243)
http://xforce.iss.net/xforce/xfdb/26243
Common Vulnerability Exposure (CVE) ID: CVE-2006-2224
Bugtraq: 20060503 Quagga RIPD unauthenticated route injection (Google Search)
http://www.securityfocus.com/archive/1/archive/1/432856/100/0/threaded
http://www.osvdb.org/25225
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10775
XForce ISS Database: quagga-ripd-ripv1-response-security-bypass(26251)
http://xforce.iss.net/xforce/xfdb/26251
Common Vulnerability Exposure (CVE) ID: CVE-2006-2276
http://lists.quagga.net/pipermail/quagga-dev/2006-March/004052.html
BugTraq ID: 17979
http://www.securityfocus.com/bid/17979
http://www.osvdb.org/25245
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10651
http://secunia.com/advisories/20116
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.