Otkriveni su višestruki sigurnosni nedostaci u radu programskog paketa Quagga, za operacijske sustave Fedora 14, 15 i 16. Udaljeni ih napadač može iskoristiti za izvođenje DoS napada ili pokretanje proizvoljnog programskog koda.
Paket: | quagga 0.x |
Operacijski sustavi: | Fedora 14, Fedora 15, Fedora 16 |
Kritičnost: | 6.5 |
Problem: | pogreška u programskoj funkciji, pogreška u programskoj komponenti, preljev međuspremnika |
Iskorištavanje: | udaljeno |
Posljedica: | proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-3325, CVE-2011-3323, CVE-2011-3324, CVE-2011-3326, CVE-2011-3327 |
Izvorni ID preporuke: | FEDORA-2011-13504 |
Izvor: | Fedora |
Problem: | |
Nedostaci su posljedica prepisivanja spremnika na gomili u "ecommunity_ecom2str", nepravilnosti u datoteci "ospf_packet.c" i OSPFv3 implementaciji, te pogrešaka u funkcijama "ospf6_lsa_is_changed" i "ospf_flood". |
|
Posljedica: | |
Napadaču omogućuju izvođenje DoS napada ili pokretanje proizvoljnog programskog koda. |
|
Rješenje: | |
Korisnike se potiče na instalaciju odgovarajućih zakrpa. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-13504
2011-09-29 22:47:20
--------------------------------------------------------------------------------
Name : quagga
Product : Fedora 15
Version : 0.99.20
Release : 2.fc15
URL : http://www.quagga.net
Summary : Routing daemon
Description :
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit, it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
--------------------------------------------------------------------------------
Update Information:
fixes CVE-2011-332{3..7}
update to latest upstream 0.99.20
fixes memory leak
--------------------------------------------------------------------------------
ChangeLog:
* Tue Oct 18 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-2
- fixes #746886 - severe memory leak in quagga 0.99.{19,20}
* Fri Sep 30 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-1
- updated to latest upstream version 0.99.20
- fixes #741343 - CVE-2011-3325 corrected fix
* Thu Sep 29 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.19-1
- fixes #741343 - CVE-2011-3323 CVE-2011-3324 CVE-2011-3325 CVE-2011-3326
CVE-2011-3327
- fixes #741580 - updated to latest upstream version 0.99.19
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #738393 - CVE-2011-3323 Quagga (ospf6d): Stack-based buffer overflow
while decoding Link State Update packet with malformed Inter Area Prefix LSA
https://bugzilla.redhat.com/show_bug.cgi?id=738393
[ 2 ] Bug #738394 - CVE-2011-3324 Quagga (ospf6d): Denial of service by
decoding malformed Database Description packet headers
https://bugzilla.redhat.com/show_bug.cgi?id=738394
[ 3 ] Bug #738396 - CVE-2011-3325 Quagga (ospfd): Denial of service by
decoding too short Hello packet or Hello packet with invalid OSPFv2 header type
https://bugzilla.redhat.com/show_bug.cgi?id=738396
[ 4 ] Bug #738398 - CVE-2011-3326 Quagga (ospfd): Denial of service by
decoding Link State Update LSAs of unknown type
https://bugzilla.redhat.com/show_bug.cgi?id=738398
[ 5 ] Bug #738400 - CVE-2011-3327 Quagga (bgpd): Heap-based buffer overflow by
decoding BGP UPDATE message with unknown AS_PATH attributes
https://bugzilla.redhat.com/show_bug.cgi?id=738400
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update quagga' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-13499
2011-09-29 22:47:08
--------------------------------------------------------------------------------
Name : quagga
Product : Fedora 14
Version : 0.99.20
Release : 2.fc14
URL : http://www.quagga.net
Summary : Routing daemon
Description :
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit, it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
--------------------------------------------------------------------------------
Update Information:
fixes CVE-2011-332{3..7}
update to latest upstream 0.99.20
fixes memory leak
--------------------------------------------------------------------------------
ChangeLog:
* Tue Oct 18 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-2
- fixes #746886 - severe memory leak in quagga 0.99.{19,20}
* Fri Sep 30 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-1
- updated to latest upstream version 0.99.20
- fixes #741343 - CVE-2011-3325 corrected fix
* Thu Sep 29 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.19-1
- fixes #741343 - CVE-2011-3323 CVE-2011-3324 CVE-2011-3325 CVE-2011-3326
CVE-2011-3327
- fixes #741580 - updated to latest upstream version 0.99.19
* Thu Jun 23 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.18-2
- fixes #712467 - type in init.d script causes strange message on boot
* Wed Mar 23 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.18-1
- fixes #689852 - CVE-2010-1674 CVE-2010-1675 quagga various flaws
- fixes #689763 - updated to latest upstream version 0.99.18
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #738393 - CVE-2011-3323 Quagga (ospf6d): Stack-based buffer overflow
while decoding Link State Update packet with malformed Inter Area Prefix LSA
https://bugzilla.redhat.com/show_bug.cgi?id=738393
[ 2 ] Bug #738394 - CVE-2011-3324 Quagga (ospf6d): Denial of service by
decoding malformed Database Description packet headers
https://bugzilla.redhat.com/show_bug.cgi?id=738394
[ 3 ] Bug #738396 - CVE-2011-3325 Quagga (ospfd): Denial of service by
decoding too short Hello packet or Hello packet with invalid OSPFv2 header type
https://bugzilla.redhat.com/show_bug.cgi?id=738396
[ 4 ] Bug #738398 - CVE-2011-3326 Quagga (ospfd): Denial of service by
decoding Link State Update LSAs of unknown type
https://bugzilla.redhat.com/show_bug.cgi?id=738398
[ 5 ] Bug #738400 - CVE-2011-3327 Quagga (bgpd): Heap-based buffer overflow by
decoding BGP UPDATE message with unknown AS_PATH attributes
https://bugzilla.redhat.com/show_bug.cgi?id=738400
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update quagga' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-13492
2011-09-29 17:10:19
--------------------------------------------------------------------------------
Name : quagga
Product : Fedora 16
Version : 0.99.20
Release : 2.fc16
URL : http://www.quagga.net
Summary : Routing daemon
Description :
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit, it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
--------------------------------------------------------------------------------
Update Information:
fixes CVE-2011-332{3..7}
update to latest upstream 0.99.20
fixes memory leak
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #738393 - CVE-2011-3323 Quagga (ospf6d): Stack-based buffer overflow
while decoding Link State Update packet with malformed Inter Area Prefix LSA
https://bugzilla.redhat.com/show_bug.cgi?id=738393
[ 2 ] Bug #738394 - CVE-2011-3324 Quagga (ospf6d): Denial of service by
decoding malformed Database Description packet headers
https://bugzilla.redhat.com/show_bug.cgi?id=738394
[ 3 ] Bug #738396 - CVE-2011-3325 Quagga (ospfd): Denial of service by
decoding too short Hello packet or Hello packet with invalid OSPFv2 header type
https://bugzilla.redhat.com/show_bug.cgi?id=738396
[ 4 ] Bug #738398 - CVE-2011-3326 Quagga (ospfd): Denial of service by
decoding Link State Update LSAs of unknown type
https://bugzilla.redhat.com/show_bug.cgi?id=738398
[ 5 ] Bug #738400 - CVE-2011-3327 Quagga (bgpd): Heap-based buffer overflow by
decoding BGP UPDATE message with unknown AS_PATH attributes
https://bugzilla.redhat.com/show_bug.cgi?id=738400
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update quagga' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke