CVE-2013-2236
Publication date 23 October 2013
Last updated 24 July 2024
Ubuntu priority
Description
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| quagga | ||
| 14.04 LTS trusty | Not in release | |
Notes
jdstrand
requires --enable-opaque-lsa during the build (true for Ubuntu 10.04 LTS and higher) also requires starting ospfd with '-a'. ospfd is not enabled by default and the configuration in /etc/quagga/debian.conf does not include '-a'. Per upstream, normal protection measures (eg, packet filtering, listening on internal network, etc) would prevent this. Furthermore, it is difficult to exploit. Considering the above, downgrading to 'low'
Patch details
| Package | Patch details |
|---|---|
| quagga |
|
References
Related Ubuntu Security Notices (USN)
- USN-2941-1
- Quagga vulnerabilities
- 24 March 2016