Description
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
CVSS vector
AV:A/AC:L/C:N/I:N/A:PExploitability: 6.5 | Impact: 2.9Complexity: Low
Confidentiality: None
Integrity: None
Affected Packages1 packages
๐ดVulnerability Details
2GHSAGHSA-w6rh-c4vv-wcr5: Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0โ2022-05-04 โถ CVEListCVE-2012-0250: Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0โ2012-04-05 โถ ๐Vendor Advisories
2UbuntuQuagga vulnerabilitiesโ2012-05-15 โถ Red Hat(ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structuresโ2012-03-28 โถ ๐ฌCommunity
2BugzillaCVE-2012-0249 CVE-2012-0250 CVE-2012-0255 quagga various flaws [fedora-all]โ2012-03-30 โถ BugzillaCVE-2012-0250 quagga (ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structuresโ2012-03-13 โถ