![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.69333 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2197-1) |
Summary: | The remote host is missing an update for the Debian 'quagga' package(s) announced via the DSA-2197-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'quagga' package(s) announced via the DSA-2197-1 advisory. Vulnerability Insight: It has been discovered that the Quagga routing daemon contains two denial-of-service vulnerabilities in its BGP implementation: CVE-2010-1674 A crafted Extended Communities attribute triggers a NULL pointer dereference which causes the BGP daemon to crash. The crafted attributes are not propagated by the Internet core, so only explicitly configured direct peers are able to exploit this vulnerability in typical configurations. CVE-2010-1675 The BGP daemon resets BGP sessions when it encounters malformed AS_PATHLIMIT attributes, introducing a distributed BGP session reset vulnerability which disrupts packet forwarding. Such malformed attributes are propagated by the Internet core, and exploitation of this vulnerability is not restricted to directly configured BGP peers. This security update removes AS_PATHLIMIT processing from the BGP implementation, preserving the configuration statements for backwards compatibility. (Standardization of this BGP extension was abandoned long ago.) For the oldstable distribution (lenny), these problems have been fixed in version 0.99.10-1lenny5. For the stable distribution (squeeze), these problems have been fixed in version 0.99.17-2+squeeze2. For the testing distribution (wheezy) and the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your quagga packages. Affected Software/OS: 'quagga' package(s) on Debian 5, Debian 6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-1674 BugTraq ID: 46942 http://www.securityfocus.com/bid/46942 Debian Security Information: DSA-2197 (Google Search) http://www.debian.org/security/2011/dsa-2197 http://security.gentoo.org/glsa/glsa-201202-02.xml http://www.mandriva.com/security/advisories?name=MDVSA-2011:058 http://www.osvdb.org/71259 RedHat Security Advisories: RHSA-2012:1258 http://rhn.redhat.com/errata/RHSA-2012-1258.html http://secunia.com/advisories/43499 http://secunia.com/advisories/43770 http://secunia.com/advisories/48106 SuSE Security Announcement: SUSE-SR:2011:005 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html SuSE Security Announcement: SUSE-SU-2011:1316 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html http://www.vupen.com/english/advisories/2011/0711 XForce ISS Database: quagga-community-dos(66211) https://exchange.xforce.ibmcloud.com/vulnerabilities/66211 Common Vulnerability Exposure (CVE) ID: CVE-2010-1675 BugTraq ID: 46943 http://www.securityfocus.com/bid/46943 http://www.osvdb.org/71258 XForce ISS Database: quagga-aspath-dos(66212) https://exchange.xforce.ibmcloud.com/vulnerabilities/66212 |
Copyright | Copyright (C) 2011 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |