Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.882853
Category:CentOS Local Security Checks
Title:CentOS Update for quagga CESA-2018:0377 centos7
Summary:Check the version of quagga
Description:Summary:
Check the version of quagga

Vulnerability Insight:
The quagga packages contain Quagga, the
free network-routing software suite that manages TCP/IP based protocols.
Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng
protocols, and is intended to be used as a Route Server and Route Reflector.

Security Fix(es):

* quagga: Double free vulnerability in bgpd when processing certain forms
of UPDATE message allowing to crash or potentially execute arbitrary code
(CVE-2018-5379)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank the Quagga project for reporting this issue.

Affected Software/OS:
quagga on CentOS 7

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-5379
BugTraq ID: 103105
http://www.securityfocus.com/bid/103105
CERT/CC vulnerability note: VU#940439
http://www.kb.cert.org/vuls/id/940439
Debian Security Information: DSA-4115 (Google Search)
https://www.debian.org/security/2018/dsa-4115
https://security.gentoo.org/glsa/201804-17
https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html
RedHat Security Advisories: RHSA-2018:0377
https://access.redhat.com/errata/RHSA-2018:0377
https://usn.ubuntu.com/3573-1/
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.