Severity
8.1HIGH
EPSS
20.4%
top 4.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 17
Latest updateMay 14

Description

The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

Ubuntuquagga< 0.99.22.4-3ubuntu1.1
NVDquagga/quagga0.99.24

Also affects: Debian Linux 7.0, 8.0

🔴Vulnerability Details

4
GHSA
GHSA-jm86-8c92-649g: The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn2022-05-14
OSV
quagga vulnerabilities2016-03-24
OSV
CVE-2016-2342: The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn2016-03-17
CVEList
CVE-2016-2342: The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn2016-03-17

📋Vendor Advisories

2
Ubuntu
Quagga vulnerabilities2016-03-24
Red Hat
quagga: VPNv4 NLRI parser memcpys to stack on unchecked length2016-03-09

💬Community

2
Bugzilla
CVE-2016-2342 quagga: VPNv4 NLRI parses memcpys to stack on unchecked length [fedora-all]2016-03-10
Bugzilla
CVE-2016-2342 quagga: VPNv4 NLRI parser memcpys to stack on unchecked length2016-03-10
CVE-2016-2342 (HIGH CVSS 8.1) | The bgp_nlri_parse_vpnv4 function i | cvebase.io