|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2803-1 (quagga - several vulnerabilities)|
|Summary:||Multiple vulnerabilities were discovered in Quagga, a BGP/OSPF/RIP;routing daemon:;;CVE-2013-2236;A buffer overflow was found in the OSPF API-server (exporting the LSDB;and allowing announcement of Opaque-LSAs).;;CVE-2013-6051;bgpd could be crashed through BGP updates. This only affects Wheezy/stable.|
Multiple vulnerabilities were discovered in Quagga, a BGP/OSPF/RIP
A buffer overflow was found in the OSPF API-server (exporting the LSDB
and allowing announcement of Opaque-LSAs).
bgpd could be crashed through BGP updates. This only affects Wheezy/stable.
quagga on Debian Linux
For the oldstable distribution (squeeze), these problems have been fixed in
For the stable distribution (wheezy), these problems have been fixed in
For the unstable distribution (sid), these problems have been fixed in
We recommend that you upgrade your quagga packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-2236|
BugTraq ID: 60955
Debian Security Information: DSA-2803 (Google Search)
RedHat Security Advisories: RHSA-2017:0794
Common Vulnerability Exposure (CVE) ID: CVE-2013-6051
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.