Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6432-1

Ubuntu Security Notice 6432-1 - It was discovered that the Quagga BGP daemon did not properly check the attribute length in NRLI. A remote attacker could possibly use this issue to cause a denial of service. It was discovered that the Quagga BGP daemon did not properly manage memory when reading initial bytes of ORF header. A remote attacker could possibly use this issue to cause a denial of service.

Packet Storm
#vulnerability#ubuntu#dos#perl

==========================================================================
Ubuntu Security Notice USN-6432-1
October 17, 2023

quagga vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS (Available with Ubuntu Pro)
  • Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in Quagga.

Software Description:

  • quagga: BGP/OSPF/RIP routing daemon

Details:

It was discovered that the Quagga BGP daemon did not properly check the
attribute length in NRLI. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-41358)

It was discovered that the Quagga BGP daemon did not properly manage memory
when reading initial bytes of ORF header. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-41360)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
quagga 1.2.4-4ubuntu0.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
quagga 1.2.4-1ubuntu0.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
quagga 0.99.24.1-2ubuntu1.4+esm1

After a standard system update you need to restart Quagga to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6432-1
CVE-2023-41358, CVE-2023-41360

Package Information:
https://launchpad.net/ubuntu/+source/quagga/1.2.4-4ubuntu0.1

Related news

Debian Security Advisory 5495-1

Debian Linux Security Advisory 5495-1 - Multiple vulnerabilities were discovered in frr, the FRRouting suite of internet protocols, while processing malformed requests and packets the BGP daemon may have reachable assertions, NULL pointer dereference, out-of-bounds memory access, which may lead to denial of service attack.

CVE-2023-41358: bgpd: Do not process NLRIs if the attribute length is zero by ton31337 · Pull Request #14260 · FRRouting/frr

An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.

CVE-2023-41360: bgpd: Don't read the first byte of ORF header if we are ahead of stream by ton31337 · Pull Request #14245 · FRRouting/frr

An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution