int(3133)

Vulnerability Bulletins


Denegación de servicio en Quagga

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Quagga <= 0.98.6
Quagga <= 0.99.6

Description

Se ha descubierto una vulnerabilidad en Quagga 0.98.6 y en versiones anteriores y además en versiones anteriores a 0.99. La vulnerabilidad reside en un error en bgpd/bgp_attr.c debido a que no valida la longitud de los valores en los atributos MP_REACH_NLRI y MP_UNREACH_NLRI.

Un atacante remoto podría causar una denegación de servicio mediante mensages UPDATE especialmente construidos que podrían provocar un desbordamiento de búfer.

Solution



Actualización de software

Mandriva

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/libquagga0-0.99.3-1.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/libquagga0-devel-0.99.3-1.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/quagga-0.99.3-1.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/quagga-contrib-0.99.3-1.1.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/quagga-0.99.3-1.1.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/lib64quagga0-0.99.3-1.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/lib64quagga0-devel-0.99.3-1.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/quagga-0.99.3-1.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/quagga-contrib-0.99.3-1.1.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/quagga-0.99.3-1.1.20060mlcs4.src.rpm

Debian

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4.dsc
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4.diff.gz
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.4_all.deb
Alpha
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_amd64.deb
ARM
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_ia64.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_sparc.deb

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2.dsc
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2.diff.gz
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.5-5etch2_all.deb
Alpha
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_amd64.deb
ARM
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_ia64.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_sparc.deb

Red Hat (RHSA-2007:0389-3)
RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

SGI
Advanced Linux Environment 3 / RPM / Patch 10415
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10415
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Standar resources

Property Value
CVE CVE-2007-1995
BID 23417

Other resources

Mandriva Security Advisory (MDKSA-2007:096)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:096

Debian Security Advisory (DSA 1293-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00049.html

Red Hat Security Advisory (RHSA-2007:0389-3)
https://rhn.redhat.com/errata/RHSA-2007-0389.html

SGI Security Advisory (20070601-01-P)
ftp://patches.sgi.com/support/free/security/advisories/20070601-01-P.asc

Version history

Version Comments Date
1.0 Aviso emitido 2007-05-09
1.1 Aviso emitido por Debian (DSA 1293-1) 2007-05-17
1.2 Aviso emitido por Red Hat (RHSA-2007:0389-3) 2007-05-30
1.3 Aviso emitido por SGI (20070601-01-P) 2007-06-11
Ministerio de Defensa
CNI
CCN
CCN-CERT