Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2017-15865 CVE-2018-5378 CVE-2018-5379 CVE-2018-5380 CVE-2018-5381 CVE-2022-37032 CVE-2024-44070 |
CWE-ID | CWE-200 CWE-119 CWE-415 CWE-125 CWE-835 CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #6 is available. |
Vulnerable software |
SUSE Linux Enterprise Software Development Kit 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system quagga-devel Operating systems & Components / Operating system package or component libospf0-debuginfo Operating systems & Components / Operating system package or component quagga Operating systems & Components / Operating system package or component libquagga_pb0 Operating systems & Components / Operating system package or component libospfapiclient0-debuginfo Operating systems & Components / Operating system package or component libospf0 Operating systems & Components / Operating system package or component libquagga_pb0-debuginfo Operating systems & Components / Operating system package or component quagga-debuginfo Operating systems & Components / Operating system package or component libospfapiclient0 Operating systems & Components / Operating system package or component libzebra1-debuginfo Operating systems & Components / Operating system package or component libfpm_pb0 Operating systems & Components / Operating system package or component quagga-debugsource Operating systems & Components / Operating system package or component libzebra1 Operating systems & Components / Operating system package or component libfpm_pb0-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU97714
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-15865
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error when handling attribute length in BPG packets. A remote attacker can send a malformed BGP UPDATE packet from a connected peer and trigger transmission of up to a few thousand unintended bytes.
MitigationUpdate the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10655
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5378
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the Quagga BGP daemon due to failure to properly bounds check data sent with a NOTIFY to a peer by the Quagga BGP daemon, bgpd. A remote attacker can send specially crafted input and cause the bgpd process or the daemon to crash.
Update the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10612
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-5379
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the Quagga BGP daemon due to double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A remote attacker can supply specially crafted input, trigger bqpd to crash and execute arbitrary code.
Update the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10617
Risk: Low
CVSSv4.0: 6.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5380
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.
The weakness exists in the Quagga BGP daemon due to out-of-bounds read. A remote attacker send a specially crafted input, overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value and read arbitrary data or cause a denial of service.
Update the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10618
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-5381
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the Quagga BGP daemon due to improper handling of invalid OPEN messages. A remote attacker can trigger infinite loop and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
Update the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67277
Risk: Medium
CVSSv4.0: 2.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2022-37032
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition when processing BGP messages. A remote attacker can send specially crafted BGP messages to the system, trigger an out-of-bounds read error and read contents of memory on the system or crash the BGP daemon.
MitigationUpdate the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU97120
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-44070
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the bgp_attr_encap() function in bgpd/bgp_attr.c. A remote attacker can send specially crafted BGP traffic to the daemon and perform a denial of service (DoS) attack.
MitigationUpdate the affected package quagga to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
quagga-devel: before 1.1.1-17.13.1
libospf0-debuginfo: before 1.1.1-17.13.1
quagga: before 1.1.1-17.13.1
libquagga_pb0: before 1.1.1-17.13.1
libospfapiclient0-debuginfo: before 1.1.1-17.13.1
libospf0: before 1.1.1-17.13.1
libquagga_pb0-debuginfo: before 1.1.1-17.13.1
quagga-debuginfo: before 1.1.1-17.13.1
libospfapiclient0: before 1.1.1-17.13.1
libzebra1-debuginfo: before 1.1.1-17.13.1
libfpm_pb0: before 1.1.1-17.13.1
quagga-debugsource: before 1.1.1-17.13.1
libzebra1: before 1.1.1-17.13.1
libfpm_pb0-debuginfo: before 1.1.1-17.13.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20243426-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.