Description: | Description: The remote host is missing an update to quagga announced via advisory FEDORA-2011-13499.
Update Information:
fixes CVE-2011-332{3..7} update to latest upstream 0.99.20 fixes memory leak
References:
[ 1 ] Bug #738393 - CVE-2011-3323 Quagga (ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA https://bugzilla.redhat.com/show_bug.cgi?id=738393 [ 2 ] Bug #738394 - CVE-2011-3324 Quagga (ospf6d): Denial of service by decoding malformed Database Description packet headers https://bugzilla.redhat.com/show_bug.cgi?id=738394 [ 3 ] Bug #738396 - CVE-2011-3325 Quagga (ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type https://bugzilla.redhat.com/show_bug.cgi?id=738396 [ 4 ] Bug #738398 - CVE-2011-3326 Quagga (ospfd): Denial of service by decoding Link State Update LSAs of unknown type https://bugzilla.redhat.com/show_bug.cgi?id=738398 [ 5 ] Bug #738400 - CVE-2011-3327 Quagga (bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes https://bugzilla.redhat.com/show_bug.cgi?id=738400
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update quagga' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-13499
Risk factor : High
|