Vulnerability identifier: #VU44627
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-3324
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Quagga
Server applications /
Other server solutions
Vendor: quagga.net
Description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Quagga: 0.95 - 0.99.17
External links
https://code.quagga.net/?p=quagga.git;a=commit;h=09395e2a0e93b2cf4258cb1de91887948796bb68
https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html
https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html
https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html
https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
https://rhn.redhat.com/errata/RHSA-2012-1258.html
https://rhn.redhat.com/errata/RHSA-2012-1259.html
https://secunia.com/advisories/46139
https://secunia.com/advisories/46274
https://secunia.com/advisories/48106
https://security.gentoo.org/glsa/glsa-201202-02.xml
https://www.debian.org/security/2011/dsa-2316
https://www.kb.cert.org/vuls/id/668534
https://www.quagga.net/download/quagga-0.99.19.changelog.txt
https://www.cert.fi/en/reports/2011/vulnerability539178.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.