ID

VAR-201206-0262


CVE

CVE-2012-1820


TITLE

Quagga BGP OPEN denial of service vulnerability

Trust: 0.8

sources: CERT/CC: VU#962587

DESCRIPTION

The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message. Quagga, a routing software suite, contains a BGP OPEN vulnerability that result in a denial-of-service condition. Quagga There is a service disruption (DoS) Vulnerabilities exist. Routing software Quagga Is bgp_capability_orf() By function BGP OPEN There is a problem with message processing and service operation is interrupted (DoS) Vulnerabilities exist.Service disruption by a remote third party (DoS) There is a possibility of being attacked. Exploiting this issue allows remote attackers to cause the vulnerable daemon to crash, denying further service to legitimate users. Quagga 0.99.20.1 and prior versions are vulnerable. For the stable distribution (squeeze), this problem has been fixed in version 0.99.20.1-0+squeeze3. For the testing distribution (wheezy) and the unstable distribution (sid), this problem has been fixed in version 0.99.21-3. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Quagga "bgp_capability_orf()" Denial of Service Vulnerability SECUNIA ADVISORY ID: SA49401 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49401/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49401 RELEASE DATE: 2012-06-08 DISCUSS ADVISORY: http://secunia.com/advisories/49401/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49401/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49401 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Quagga, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the "bgp_capability_orf()" function when parsing OPEN messages containing an ORF capability TLV. This can be exploited to cause a buffer overflow via a specially crafted packet. Successful exploitation requires control of a pre-configured BGP peer. SOLUTION: Restrict access to trusted BGP peers only. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Denis Ovsienko. ORIGINAL ADVISORY: US-CERT: http://www.kb.cert.org/vuls/id/962587 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201310-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Quagga: Multiple vulnerabilities Date: October 10, 2013 Bugs: #408507, #475706 ID: 201310-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Quagga, the worst of which could lead to arbitrary code execution. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/quagga < 0.99.22.4 >= 0.99.22.4 Description =========== Multiple vulnerabilities have been discovered in Quagga. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker may be able to cause arbitrary code execution or a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Quagga users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/quagga-0.99.22.4" References ========== [ 1 ] CVE-2012-0249 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0249 [ 2 ] CVE-2012-0250 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0250 [ 3 ] CVE-2012-0255 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0255 [ 4 ] CVE-2012-1820 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1820 [ 5 ] CVE-2013-2236 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2236 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201310-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: quagga security update Advisory ID: RHSA-2012:1259-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1259.html Issue date: 2012-09-12 CVE Names: CVE-2011-3323 CVE-2011-3324 CVE-2011-3325 CVE-2011-3326 CVE-2011-3327 CVE-2012-0249 CVE-2012-0250 CVE-2012-0255 CVE-2012-1820 ===================================================================== 1. Summary: Updated quagga packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. The Quagga ospfd and ospf6d daemons implement the OSPF (Open Shortest Path First) routing protocol. A heap-based buffer overflow flaw was found in the way the bgpd daemon processed malformed Extended Communities path attributes. An attacker could send a specially-crafted BGP message, causing bgpd on a target system to crash or, possibly, execute arbitrary code with the privileges of the user running bgpd. The UPDATE message would have to arrive from an explicitly configured BGP peer, but could have originated elsewhere in the BGP network. (CVE-2011-3327) A stack-based buffer overflow flaw was found in the way the ospf6d daemon processed malformed Link State Update packets. An OSPF router could use this flaw to crash ospf6d on an adjacent router. (CVE-2011-3323) A flaw was found in the way the ospf6d daemon processed malformed link state advertisements. An OSPF neighbor could use this flaw to crash ospf6d on a target system. (CVE-2011-3324) A flaw was found in the way the ospfd daemon processed malformed Hello packets. An OSPF neighbor could use this flaw to crash ospfd on a target system. (CVE-2011-3325) A flaw was found in the way the ospfd daemon processed malformed link state advertisements. An OSPF router in the autonomous system could use this flaw to crash ospfd on a target system. (CVE-2011-3326) An assertion failure was found in the way the ospfd daemon processed certain Link State Update packets. An OSPF router could use this flaw to cause ospfd on an adjacent router to abort. (CVE-2012-0249) A buffer overflow flaw was found in the way the ospfd daemon processed certain Link State Update packets. An OSPF router could use this flaw to crash ospfd on an adjacent router. (CVE-2012-0250) Two flaws were found in the way the bgpd daemon processed certain BGP OPEN messages. A configured BGP peer could cause bgpd on a target system to abort via a specially-crafted BGP OPEN message. (CVE-2012-0255, CVE-2012-1820) Red Hat would like to thank CERT-FI for reporting CVE-2011-3327, CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and CVE-2011-3326; and the CERT/CC for reporting CVE-2012-0249, CVE-2012-0250, CVE-2012-0255, and CVE-2012-1820. CERT-FI acknowledges Riku Hietamäki, Tuomo Untinen and Jukka Taimisto of the Codenomicon CROSS project as the original reporters of CVE-2011-3327, CVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and CVE-2011-3326. The CERT/CC acknowledges Martin Winter at OpenSourceRouting.org as the original reporter of CVE-2012-0249, CVE-2012-0250, and CVE-2012-0255, and Denis Ovsienko as the original reporter of CVE-2012-1820. Users of quagga should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the bgpd, ospfd, and ospf6d daemons will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Package List: Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm i386: quagga-0.99.15-7.el6_3.2.i686.rpm quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm ppc64: quagga-0.99.15-7.el6_3.2.ppc64.rpm quagga-debuginfo-0.99.15-7.el6_3.2.ppc64.rpm s390x: quagga-0.99.15-7.el6_3.2.s390x.rpm quagga-debuginfo-0.99.15-7.el6_3.2.s390x.rpm x86_64: quagga-0.99.15-7.el6_3.2.x86_64.rpm quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm i386: quagga-contrib-0.99.15-7.el6_3.2.i686.rpm quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm quagga-devel-0.99.15-7.el6_3.2.i686.rpm ppc64: quagga-contrib-0.99.15-7.el6_3.2.ppc64.rpm quagga-debuginfo-0.99.15-7.el6_3.2.ppc.rpm quagga-debuginfo-0.99.15-7.el6_3.2.ppc64.rpm quagga-devel-0.99.15-7.el6_3.2.ppc.rpm quagga-devel-0.99.15-7.el6_3.2.ppc64.rpm s390x: quagga-contrib-0.99.15-7.el6_3.2.s390x.rpm quagga-debuginfo-0.99.15-7.el6_3.2.s390.rpm quagga-debuginfo-0.99.15-7.el6_3.2.s390x.rpm quagga-devel-0.99.15-7.el6_3.2.s390.rpm quagga-devel-0.99.15-7.el6_3.2.s390x.rpm x86_64: quagga-contrib-0.99.15-7.el6_3.2.x86_64.rpm quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm quagga-devel-0.99.15-7.el6_3.2.i686.rpm quagga-devel-0.99.15-7.el6_3.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm i386: quagga-0.99.15-7.el6_3.2.i686.rpm quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm x86_64: quagga-0.99.15-7.el6_3.2.x86_64.rpm quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/quagga-0.99.15-7.el6_3.2.src.rpm i386: quagga-contrib-0.99.15-7.el6_3.2.i686.rpm quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm quagga-devel-0.99.15-7.el6_3.2.i686.rpm x86_64: quagga-contrib-0.99.15-7.el6_3.2.x86_64.rpm quagga-debuginfo-0.99.15-7.el6_3.2.i686.rpm quagga-debuginfo-0.99.15-7.el6_3.2.x86_64.rpm quagga-devel-0.99.15-7.el6_3.2.i686.rpm quagga-devel-0.99.15-7.el6_3.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-3323.html https://www.redhat.com/security/data/cve/CVE-2011-3324.html https://www.redhat.com/security/data/cve/CVE-2011-3325.html https://www.redhat.com/security/data/cve/CVE-2011-3326.html https://www.redhat.com/security/data/cve/CVE-2011-3327.html https://www.redhat.com/security/data/cve/CVE-2012-0249.html https://www.redhat.com/security/data/cve/CVE-2012-0250.html https://www.redhat.com/security/data/cve/CVE-2012-0255.html https://www.redhat.com/security/data/cve/CVE-2012-1820.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFQUOxMXlSAg2UNWIIRAspnAKDCd5umtQIWFZYD8vyRPpCkAlgiwwCglw+g P4VSjxs4xRnVCtT/IOkBkKQ= =VtuC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. ============================================================================ Ubuntu Security Notice USN-1605-1 October 11, 2012 quagga vulnerability ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS Summary: Quagga could be made to crash if it received specially crafted network traffic. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: quagga 0.99.20.1-0ubuntu0.12.04.3 Ubuntu 11.10: quagga 0.99.20.1-0ubuntu0.11.10.3 Ubuntu 11.04: quagga 0.99.20.1-0ubuntu0.11.04.3 Ubuntu 10.04 LTS: quagga 0.99.20.1-0ubuntu0.10.04.3 After a standard system update you need to restart Quagga to make all the necessary changes

Trust: 3.24

sources: NVD: CVE-2012-1820 // CERT/CC: VU#962587 // JVNDB: JVNDB-2012-002699 // BID: 53775 // PACKETSTORM: 113978 // PACKETSTORM: 113463 // PACKETSTORM: 121263 // PACKETSTORM: 117365 // PACKETSTORM: 123565 // PACKETSTORM: 116469 // PACKETSTORM: 117327

AFFECTED PRODUCTS

vendor:quaggamodel:quaggascope:eqversion:0.99.17

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.11

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.9

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.8

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.7

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.5

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.2

Trust: 1.9

vendor:quaggamodel:quaggascope:eqversion:0.99.1

Trust: 1.9

vendor:quaggamodel:quaggascope:lteversion:0.99.20.1

Trust: 1.8

vendor:quaggamodel:quaggascope:eqversion:0.99.19

Trust: 1.6

vendor:quaggamodel:quaggascope:eqversion:0.99.18

Trust: 1.6

vendor:quaggamodel:quaggascope:eqversion:0.99.16

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.15

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.14

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.13

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.12

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.10

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.6

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.4

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.99.3

Trust: 1.3

vendor:quaggamodel:quaggascope:eqversion:0.97.3

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.2

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.96.1

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.0

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.96.4

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.97.2

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.5

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.96.3

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.97.5

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.3

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.96.2

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.97.0

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.6

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.96.5

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.1

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.98.4

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.99.20

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.96

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.97.1

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.97.4

Trust: 1.0

vendor:quaggamodel:quaggascope:eqversion:0.95

Trust: 1.0

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:infobloxmodel: - scope: - version: -

Trust: 0.8

vendor:internet initiativemodel:seil/b1scope:eqversion:3.70 to 3.75

Trust: 0.8

vendor:internet initiativemodel:seil/x1scope:eqversion:3.70 to 3.75

Trust: 0.8

vendor:internet initiativemodel:seil/x2scope:eqversion:3.70 to 3.75

Trust: 0.8

vendor:internet initiativemodel:seil/x86scope:eqversion:2.20 to 2.35

Trust: 0.8

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:quaggamodel:quaggascope:eqversion:0.99.20.1

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

sources: CERT/CC: VU#962587 // BID: 53775 // JVNDB: JVNDB-2012-002699 // CNNVD: CNNVD-201206-020 // NVD: CVE-2012-1820

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2012-1820
value: LOW

Trust: 1.8

NVD: CVE-2012-1820
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201206-020
value: LOW

Trust: 0.6

NVD: CVE-2012-1820
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.8

NVD: CVE-2012-1820
severity: MEDIUM
baseScore: 5.5
vectorString: NONE
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 5.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#962587 // JVNDB: JVNDB-2012-002699 // CNNVD: CNNVD-201206-020 // NVD: CVE-2012-1820

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2012-002699 // NVD: CVE-2012-1820

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201206-020

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201206-020

CONFIGURATIONS

sources: NVD: CVE-2012-1820

PATCH

title:DSA-2497url:http://www.debian.org/security/2012/dsa-2497

Trust: 0.8

title:Quagga Routing Suiteurl:http://www.nongnu.org/quagga/

Trust: 0.8

title:RHSA-2012:1259url:http://rhn.redhat.com/errata/rhsa-2012-1259.html

Trust: 0.8

title:CVE-2012-1820 Denial of Service (DoS) vulnerability in Quaggaurl:http://blogs.oracle.com/sunsecurity/entry/cve_2012_1820_denial_of

Trust: 0.8

title:偽造されたBGPパケットに対する受信処理の脆弱性url:http://www.seil.jp/support/security/a01241.html

Trust: 0.8

title:USN-1605-1url:http://www.ubuntu.com/usn/usn-1605-1/

Trust: 0.8

sources: JVNDB: JVNDB-2012-002699

EXTERNAL IDS

db:NVDid:CVE-2012-1820

Trust: 4.0

db:CERT/CCid:VU#962587

Trust: 3.6

db:BIDid:53775

Trust: 1.9

db:SECUNIAid:50941

Trust: 1.1

db:JVNDBid:JVNDB-2012-002699

Trust: 0.8

db:SECUNIAid:49401

Trust: 0.8

db:NSFOCUSid:20678

Trust: 0.6

db:NSFOCUSid:20685

Trust: 0.6

db:CNNVDid:CNNVD-201206-020

Trust: 0.6

db:PACKETSTORMid:113978

Trust: 0.1

db:PACKETSTORMid:113463

Trust: 0.1

db:PACKETSTORMid:121263

Trust: 0.1

db:PACKETSTORMid:117365

Trust: 0.1

db:PACKETSTORMid:123565

Trust: 0.1

db:PACKETSTORMid:116469

Trust: 0.1

db:PACKETSTORMid:117327

Trust: 0.1

sources: CERT/CC: VU#962587 // BID: 53775 // JVNDB: JVNDB-2012-002699 // PACKETSTORM: 113978 // PACKETSTORM: 113463 // PACKETSTORM: 121263 // PACKETSTORM: 117365 // PACKETSTORM: 123565 // PACKETSTORM: 116469 // PACKETSTORM: 117327 // CNNVD: CNNVD-201206-020 // NVD: CVE-2012-1820

REFERENCES

url:http://www.kb.cert.org/vuls/id/962587

Trust: 2.8

url:http://www.securityfocus.com/bid/53775

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2012-1259.html

Trust: 1.4

url:http://www.ubuntu.com/usn/usn-1605-1

Trust: 1.1

url:http://www.debian.org/security/2012/dsa-2497

Trust: 1.0

url:http://secunia.com/advisories/50941

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1820

Trust: 0.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://jvn.jp/cert/jvnvu962587/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1820

Trust: 0.8

url:http://secunia.com/advisories/49401

Trust: 0.6

url:http://www.nsfocus.net/vulndb/20685

Trust: 0.6

url:http://www.nsfocus.net/vulndb/20678

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2012-1820

Trust: 0.5

url:https://kc.mcafee.com/corporate/index?page=content&id=kb76173

Trust: 0.3

url:http://www.quagga.net/

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0250

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0255

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0249

Trust: 0.2

url:http://secunia.com/

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/49401/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49401

Trust: 0.1

url:http://secunia.com/advisories/49401/

Trust: 0.1

url:https://wiki.mageia.org/en/support/advisories/mgasa-2012-0133

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://secunia.com/advisories/50941/#comments

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1605-1/

Trust: 0.1

url:http://secunia.com/advisories/50941/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50941

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1820

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201310-08.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2236

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2236

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0249

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0250

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0255

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3323.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3325.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3323

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3324.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3326

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3325

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-0255.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-1820.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3324

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3327

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-0249.html

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-0250.html

Trust: 0.1

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3326.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3327.html

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.10.04.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.12.04.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.11.04.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.11.10.3

Trust: 0.1

sources: CERT/CC: VU#962587 // BID: 53775 // JVNDB: JVNDB-2012-002699 // PACKETSTORM: 113978 // PACKETSTORM: 113463 // PACKETSTORM: 121263 // PACKETSTORM: 117365 // PACKETSTORM: 123565 // PACKETSTORM: 116469 // PACKETSTORM: 117327 // CNNVD: CNNVD-201206-020 // NVD: CVE-2012-1820

CREDITS

Denis Ovsienko

Trust: 0.9

sources: BID: 53775 // CNNVD: CNNVD-201206-020

SOURCES

db:CERT/CCid:VU#962587
db:BIDid:53775
db:JVNDBid:JVNDB-2012-002699
db:PACKETSTORMid:113978
db:PACKETSTORMid:113463
db:PACKETSTORMid:121263
db:PACKETSTORMid:117365
db:PACKETSTORMid:123565
db:PACKETSTORMid:116469
db:PACKETSTORMid:117327
db:CNNVDid:CNNVD-201206-020
db:NVDid:CVE-2012-1820

LAST UPDATE DATE

2022-05-29T21:29:09.586000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#962587date:2012-06-11T00:00:00
db:BIDid:53775date:2015-04-13T21:46:00
db:JVNDBid:JVNDB-2012-002699date:2012-11-13T00:00:00
db:CNNVDid:CNNVD-201206-020date:2012-07-02T00:00:00
db:NVDid:CVE-2012-1820date:2013-03-02T04:40:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#962587date:2012-06-04T00:00:00
db:BIDid:53775date:2012-06-04T00:00:00
db:JVNDBid:JVNDB-2012-002699date:2012-06-14T00:00:00
db:PACKETSTORMid:113978date:2012-06-21T04:39:27
db:PACKETSTORMid:113463date:2012-06-11T01:01:20
db:PACKETSTORMid:121263date:2013-04-11T15:44:46
db:PACKETSTORMid:117365date:2012-10-15T07:09:06
db:PACKETSTORMid:123565date:2013-10-10T12:14:00
db:PACKETSTORMid:116469date:2012-09-12T23:06:22
db:PACKETSTORMid:117327date:2012-10-12T06:07:20
db:CNNVDid:CNNVD-201206-020date:2012-06-06T00:00:00
db:NVDid:CVE-2012-1820date:2012-06-13T15:55:00