CVE-2006-2224

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://bugzilla.quagga.net/show_bug.cgi?id=262 Patch
http://secunia.com/advisories/19910 Patch Vendor Advisory
http://secunia.com/advisories/20137 Vendor Advisory
http://secunia.com/advisories/20138 Vendor Advisory
http://secunia.com/advisories/20221 Vendor Advisory
http://secunia.com/advisories/20420 Vendor Advisory
http://secunia.com/advisories/20421 Vendor Advisory
http://secunia.com/advisories/20782 Vendor Advisory
http://secunia.com/advisories/21159 Vendor Advisory
http://securitytracker.com/id?1016204
http://www.debian.org/security/2006/dsa-1059
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.osvdb.org/25225
http://www.redhat.com/support/errata/RHSA-2006-0525.html
http://www.redhat.com/support/errata/RHSA-2006-0533.html
http://www.securityfocus.com/archive/1/432823/100/0/threaded
http://www.securityfocus.com/archive/1/432856/100/0/threaded
http://www.securityfocus.com/bid/17808 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775
https://usn.ubuntu.com/284-1/
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://bugzilla.quagga.net/show_bug.cgi?id=262 Patch
http://secunia.com/advisories/19910 Patch Vendor Advisory
http://secunia.com/advisories/20137 Vendor Advisory
http://secunia.com/advisories/20138 Vendor Advisory
http://secunia.com/advisories/20221 Vendor Advisory
http://secunia.com/advisories/20420 Vendor Advisory
http://secunia.com/advisories/20421 Vendor Advisory
http://secunia.com/advisories/20782 Vendor Advisory
http://secunia.com/advisories/21159 Vendor Advisory
http://securitytracker.com/id?1016204
http://www.debian.org/security/2006/dsa-1059
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.osvdb.org/25225
http://www.redhat.com/support/errata/RHSA-2006-0525.html
http://www.redhat.com/support/errata/RHSA-2006-0533.html
http://www.securityfocus.com/archive/1/432823/100/0/threaded
http://www.securityfocus.com/archive/1/432856/100/0/threaded
http://www.securityfocus.com/bid/17808 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775
https://usn.ubuntu.com/284-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:quagga:quagga_routing_software_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga_routing_software_suite:0.95:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga_routing_software_suite:0.96.2:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga_routing_software_suite:0.96.3:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga_routing_software_suite:0.98.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc -
References () http://bugzilla.quagga.net/show_bug.cgi?id=262 - Patch () http://bugzilla.quagga.net/show_bug.cgi?id=262 - Patch
References () http://secunia.com/advisories/19910 - Patch, Vendor Advisory () http://secunia.com/advisories/19910 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20137 - Vendor Advisory () http://secunia.com/advisories/20137 - Vendor Advisory
References () http://secunia.com/advisories/20138 - Vendor Advisory () http://secunia.com/advisories/20138 - Vendor Advisory
References () http://secunia.com/advisories/20221 - Vendor Advisory () http://secunia.com/advisories/20221 - Vendor Advisory
References () http://secunia.com/advisories/20420 - Vendor Advisory () http://secunia.com/advisories/20420 - Vendor Advisory
References () http://secunia.com/advisories/20421 - Vendor Advisory () http://secunia.com/advisories/20421 - Vendor Advisory
References () http://secunia.com/advisories/20782 - Vendor Advisory () http://secunia.com/advisories/20782 - Vendor Advisory
References () http://secunia.com/advisories/21159 - Vendor Advisory () http://secunia.com/advisories/21159 - Vendor Advisory
References () http://securitytracker.com/id?1016204 - () http://securitytracker.com/id?1016204 -
References () http://www.debian.org/security/2006/dsa-1059 - () http://www.debian.org/security/2006/dsa-1059 -
References () http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml - () http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml -
References () http://www.novell.com/linux/security/advisories/2006_17_sr.html - () http://www.novell.com/linux/security/advisories/2006_17_sr.html -
References () http://www.osvdb.org/25225 - () http://www.osvdb.org/25225 -
References () http://www.redhat.com/support/errata/RHSA-2006-0525.html - () http://www.redhat.com/support/errata/RHSA-2006-0525.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0533.html - () http://www.redhat.com/support/errata/RHSA-2006-0533.html -
References () http://www.securityfocus.com/archive/1/432823/100/0/threaded - () http://www.securityfocus.com/archive/1/432823/100/0/threaded -
References () http://www.securityfocus.com/archive/1/432856/100/0/threaded - () http://www.securityfocus.com/archive/1/432856/100/0/threaded -
References () http://www.securityfocus.com/bid/17808 - Exploit, Patch () http://www.securityfocus.com/bid/17808 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26251 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26251 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775 -
References () https://usn.ubuntu.com/284-1/ - () https://usn.ubuntu.com/284-1/ -

Information

Published : 2006-05-05 19:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2224

Mitre link : CVE-2006-2224

CVE.ORG link : CVE-2006-2224


JSON object : View

Products Affected

quagga

  • quagga_routing_software_suite
CWE
CWE-287

Improper Authentication