Subject: | |
From: | |
Reply To: | |
Date: | Fri, 4 Mar 2011 14:34:54 -0600 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: quagga security update
Issue date: 2010-12-06
CVE Names: CVE-2010-2948 CVE-2010-2949
A stack-based buffer overflow flaw was found in the way the Quagga bgpd
daemon processed certain BGP Route Refresh (RR) messages. A configured
BGP peer could send a specially-crafted BGP message, causing bgpd on a
target system to crash or, possibly, execute arbitrary code with the
privileges of the user running bgpd. (CVE-2010-2948)
Note: On Scientific Linux 6 it is not possible to exploit
CVE-2010-2948 to run arbitrary code as the overflow is blocked by
FORTIFY_SOURCE.
A NULL pointer dereference flaw was found in the way the Quagga bgpd
daemon parsed the paths of autonomous systems (AS). A configured BGP
peer could crash bgpd on a target system via a specially-crafted BGP
message. (CVE-2010-2949)
After installing the updated packages, the bgpd daemon must be restarted
for the update to take effect.
SL 6.x
SRPMS:
quagga-0.99.15-5.el6_0.1.src.rpm
i386:
quagga-0.99.15-5.el6_0.1.i686.rpm
quagga-contrib-0.99.15-5.el6_0.1.i686.rpm
quagga-devel-0.99.15-5.el6_0.1.i686.rpm
x86_64:
quagga-0.99.15-5.el6_0.1.x86_64.rpm
quagga-contrib-0.99.15-5.el6_0.1.x86_64.rpm
quagga-devel-0.99.15-5.el6_0.1.i686.rpm
quagga-devel-0.99.15-5.el6_0.1.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|