CVE-2018-5379

Severity
9.8CRITICAL
EPSS
7.0%
top 8.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 19
Latest updateMay 13

Description

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages6 packages

CVEListV5quagga/bgpdbpgd1.2.3
Ubuntuquagga< 0.99.22.4-3ubuntu1.5+1
NVDquagga/quagga1.2.2

Also affects: Debian Linux 7.0, 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 17.10, Enterprise Linux 7.4, 7.6, 7.5

🔴Vulnerability Details

4
GHSA
GHSA-5prq-47x2-38gv: The Quagga BGP daemon (bgpd) prior to version 12022-05-13
CVEList
CVE-2018-5379: The Quagga BGP daemon (bgpd) prior to version 12018-02-19
OSV
quagga vulnerabilities2018-02-16
OSV
CVE-2018-5379: The Quagga BGP daemon (bgpd) prior to version 12018-02-13

📋Vendor Advisories

2
Ubuntu
Quagga vulnerabilities2018-02-16
Red Hat
quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code2018-02-15

💬Community

2
Bugzilla
CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code [fedora-all]2018-02-16
Bugzilla
CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code2018-02-07