The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Quagga: denial of service of bgpd

Synthesis of the vulnerability 

A peer can send a malicious OPEN or COMMUNITY message in order to stop bgpd daemon.
Vulnerable systems: Debian, Fedora, Solaris, RHEL.
Severity of this threat: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/09/2007.
Revision date: 13/09/2007.
Références of this weakness: 236141, 6554276, 6607647, BID-25634, CVE-2007-4826, DSA-1379-1, FEDORA-2007-2196, MDKSA-2007:182, RHSA-2010:0785-01, VIGILANCE-VUL-7160.

Description of the vulnerability 

A peer can generate two denials of service in Quagga.

An attacker can send an OPEN message with an invalid message or option length which generates an assertion error in the stream library and leads to a denial of service. [severity:1/4]

When update debug is activated ("debug bgp updates"), an attacker can send a malicious COMMUNITY message in order to dereference a NULL pointer. [severity:1/4]

An allowed peer can therefore send a malicious message in order to stop daemon.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer threat impacts software or systems such as Debian, Fedora, Solaris, RHEL.

Our Vigil@nce team determined that the severity of this computer vulnerability alert is low.

The trust level is of type confirmed by the editor, with an origin of intranet client.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this cybersecurity weakness.

Solutions for this threat 

Quagga: version 0.99.9.
Version 0.99.9 is corrected:
  http://www.quagga.net/

Debian: new quagga packages.
New packages are available:
Debian GNU/Linux 3.1 alias sarge
 amd64 architecture (AMD x86_64 (AMD64))
  http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_amd64.deb
    Size/MD5 checksum: 1413484 399d4fe967343eb586eb4f17348d2f4b
 i386 architecture (Intel ia32)
  http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_i386.deb
    Size/MD5 checksum: 1192432 e3057ed965a580381e7c15dc430df295
 ia64 architecture (Intel ia64)
  http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_ia64.deb
    Size/MD5 checksum: 1829272 e182c3ae76fe84b9b041498aef8807ee
Debian GNU/Linux 4.0 alias etch
 amd64 architecture (AMD x86_64 (AMD64))
  http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_amd64.deb
    Size/MD5 checksum: 1414716 00846f88e7df3db61001d54fd5647d23
 i386 architecture (Intel ia32)
  http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_i386.deb
    Size/MD5 checksum: 1247076 6334fa5dd1344e6be4bfe77d8f5efba7
 ia64 architecture (Intel ia64)
  http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_ia64.deb
    Size/MD5 checksum: 1955634 6b98821ad60bd0a757b274488f92a50d

Fedora 7: new quagga packages.
New packages are available:
526c17085b5f49ec5e9bc2a5d4207e5bc04decf0 quagga-0.99.9-1.fc7.ppc64.rpm
99731ed848a567bdb06833551792cad6a9b82bf5 quagga-contrib-0.99.9-1.fc7.ppc64.rpm
5d37ff9ab76c7a2bf23138f2e58fc4179fd09b3f quagga-devel-0.99.9-1.fc7.ppc64.rpm
a1f8eda8da8e97cad405a9b4c2bd8a8c68aa90e9 quagga-debuginfo-0.99.9-1.fc7.ppc64.rpm
8408ec91de38943841e81f1248636909618a0f42 quagga-contrib-0.99.9-1.fc7.i386.rpm
2eaf329428744b25d373edba90aaeaaf656ba289 quagga-0.99.9-1.fc7.i386.rpm
36ffd056ab90d5014eee1421248c3dacebe42135 quagga-devel-0.99.9-1.fc7.i386.rpm
2553506531144729a069a89c90afcc9c7a4945c9 quagga-debuginfo-0.99.9-1.fc7.i386.rpm
0de097d18b1d7507d8de393c66cfbadaad615cb6 quagga-devel-0.99.9-1.fc7.x86_64.rpm
5a8c86b8a1a152975f02cfc48c698a27ac406ad6 quagga-contrib-0.99.9-1.fc7.x86_64.rpm
61c3ab98484415d6a8255d9ff9e397ee9eda6df8 quagga-debuginfo-0.99.9-1.fc7.x86_64.rpm
bf5fb02497c258d1c96ef66556a68ca85e109409 quagga-0.99.9-1.fc7.x86_64.rpm
8792bae6299a91229e6baa9e2f5cac7d22051890 quagga-devel-0.99.9-1.fc7.ppc.rpm
330231a6c88fcc7295aaec25fdeac2c19f9d2ec1 quagga-debuginfo-0.99.9-1.fc7.ppc.rpm
08802ad226c5c7b8da010bcd282463cd6e61f05a quagga-contrib-0.99.9-1.fc7.ppc.rpm
16b89f5fbeb22a98eefe2397baf5dd8e038ad2af quagga-0.99.9-1.fc7.ppc.rpm
762db1963ba8e085c7536193cf7fa78b21cf0c05 quagga-0.99.9-1.fc7.src.rpm

Mandriva Corporate: new quagga packages.
New packages are available:
 
 Corporate 4.0:
 ab6e0e1d280a6945ce7a5b47d908181c corporate/4.0/i586/libquagga0-0.99.9-0.1.20060mlcs4.i586.rpm
 f0744b4772d1d15dc5d02d0642e5f0da corporate/4.0/i586/libquagga0-devel-0.99.9-0.1.20060mlcs4.i586.rpm
 6d5921788f7a5c169f053013fa4dd0c5 corporate/4.0/i586/quagga-0.99.9-0.1.20060mlcs4.i586.rpm
 cde3640e96e96e47384181a940a9e8c1 corporate/4.0/i586/quagga-contrib-0.99.9-0.1.20060mlcs4.i586.rpm
 5e64b02beff305ba5a37272e13592739 corporate/4.0/SRPMS/quagga-0.99.9-0.1.20060mlcs4.src.rpm
 Corporate 4.0/X86_64:
 24474feed270055ce5e5ed096c227e50 corporate/4.0/x86_64/lib64quagga0-0.99.9-0.1.20060mlcs4.x86_64.rpm
 cac13525b2e2935e314fe8a8a0dd1626 corporate/4.0/x86_64/lib64quagga0-devel-0.99.9-0.1.20060mlcs4.x86_64.rpm
 dcb01be5184742e412f99f5fa601f7a7 corporate/4.0/x86_64/quagga-0.99.9-0.1.20060mlcs4.x86_64.rpm
 c8978f69636129050debd2e721bba887 corporate/4.0/x86_64/quagga-contrib-0.99.9-0.1.20060mlcs4.x86_64.rpm
 5e64b02beff305ba5a37272e13592739 corporate/4.0/SRPMS/quagga-0.99.9-0.1.20060mlcs4.src.rpm

RHEL 4, 5: new quagga packages.
New packages are available:
Red Hat Enterprise Linux version 4:
  quagga-0.98.3-4.el4_8.1
Red Hat Enterprise Linux version 5:
  quagga-0.98.6-5.el5_5.2

Solaris: patch for Quagga.
A patch is available:
  Solaris 10 :
    SPARC: 126206-09
    X86: 126207-09
  Solaris 11 :
    11/11 SRU 4

Solaris: patch for Quagga/Zebra.
A patch is available:
  SPARC Platform:
    * Solaris 10 : patch 126206-04
  x86 Platform:
    * Solaris 10 : patch 126207-04
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides system vulnerability analysis. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.