1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
PublicDateAtUSN: 2012-04-05
Candidate: CVE-2012-0250
PublicDate: 2012-04-05
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0250
http://www.kb.cert.org/vuls/id/551715
http://www.ubuntu.com/usn/usn-1441-1
Description:
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before
0.99.20.1 allows remote attackers to cause a denial of service (daemon
crash) via a Link State Update (aka LS Update) packet containing a
network-LSA link-state advertisement for which the data-structure length is
smaller than the value in the Length header field.
Ubuntu-Description:
Notes:
Bugs:
Priority: medium
Discovered-by:
Assigned-to: mdeslaur
Patches_quagga:
upstream_quagga: released (0.99.20.1-1)
hardy_quagga: ignored (reached end-of-life)
lucid_quagga: released (0.99.20.1-0ubuntu0.10.04.2)
maverick_quagga: ignored (reached end-of-life)
natty_quagga: released (0.99.20.1-0ubuntu0.11.04.2)
oneiric_quagga: released (0.99.20.1-0ubuntu0.11.10.2)
precise_quagga: released (0.99.20.1-0ubuntu0.12.04.2)
devel_quagga: not-affected (0.99.20.1-1)
|