CVE-2013-2236
Publication date 23 October 2013
Last updated 24 July 2024
Ubuntu priority
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
Status
Package | Ubuntu Release | Status |
---|---|---|
quagga | ||
14.04 LTS trusty | Not in release | |
Notes
jdstrand
requires --enable-opaque-lsa during the build (true for Ubuntu 10.04 LTS and higher) also requires starting ospfd with '-a'. ospfd is not enabled by default and the configuration in /etc/quagga/debian.conf does not include '-a'. Per upstream, normal protection measures (eg, packet filtering, listening on internal network, etc) would prevent this. Furthermore, it is difficult to exploit. Considering the above, downgrading to 'low'
Patch details
Package | Patch details |
---|---|
quagga |
|
References
Related Ubuntu Security Notices (USN)
- USN-2941-1
- Quagga vulnerabilities
- 24 March 2016