Show filters
36 Total Results
Displaying 11-20 of 36
Sort by:
Attacker Value
Unknown
CVE-2016-4049
Disclosure Date: May 23, 2016 (last updated November 25, 2024)
The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
0
Attacker Value
Unknown
CVE-2016-2342
Disclosure Date: March 17, 2016 (last updated November 25, 2024)
The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.
0
Attacker Value
Unknown
CVE-2013-6051
Disclosure Date: December 14, 2013 (last updated October 05, 2023)
The bgp_attr_unknown function in bgp_attr.c in Quagga 0.99.21 does not properly initialize the total variable, which allows remote attackers to cause a denial of service (bgpd crash) via a crafted BGP update.
0
Attacker Value
Unknown
CVE-2013-2236
Disclosure Date: October 24, 2013 (last updated October 05, 2023)
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
0
Attacker Value
Unknown
CVE-2012-1820
Disclosure Date: June 13, 2012 (last updated October 04, 2023)
The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message.
0
Attacker Value
Unknown
CVE-2012-0250
Disclosure Date: April 05, 2012 (last updated October 04, 2023)
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
0
Attacker Value
Unknown
CVE-2012-0255
Disclosure Date: April 05, 2012 (last updated October 04, 2023)
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
0
Attacker Value
Unknown
CVE-2012-0249
Disclosure Date: April 05, 2012 (last updated October 04, 2023)
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
0
Attacker Value
Unknown
CVE-2011-3323
Disclosure Date: October 10, 2011 (last updated October 04, 2023)
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
0
Attacker Value
Unknown
CVE-2011-3326
Disclosure Date: October 10, 2011 (last updated October 04, 2023)
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
0