FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

quagga -- several security issues

Affected packages
quagga < 1.2.3

Details

VuXML ID e15a22ce-f16f-446b-9ca7-6859350c2e75
Discovery 2018-01-31
Entry 2018-02-15

Quagga reports:

The Quagga BGP daemon, bgpd, does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or it may crash.

The Quagga BGP daemon, bgpd, can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes.

The Quagga BGP daemon, bgpd, can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.

The Quagga BGP daemon, bgpd, can enter an infinite loop if sent an invalid OPEN message by a configured peer.

References

CVE Name CVE-2018-5378
CVE Name CVE-2018-5379
CVE Name CVE-2018-5380
CVE Name CVE-2018-5381
URL https://www.quagga.net/security/Quagga-2018-0543.txt
URL https://www.quagga.net/security/Quagga-2018-1114.txt
URL https://www.quagga.net/security/Quagga-2018-1550.txt
URL https://www.quagga.net/security/Quagga-2018-1975.txt