CVE-2011-3327

Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
References
Link Resource
http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=94431dbc753171b48b5c6806af97fd690813b00a
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
http://rhn.redhat.com/errata/RHSA-2012-1258.html
http://rhn.redhat.com/errata/RHSA-2012-1259.html
http://secunia.com/advisories/46139 Vendor Advisory
http://secunia.com/advisories/46274
http://secunia.com/advisories/48106
http://security.gentoo.org/glsa/glsa-201202-02.xml
http://www.debian.org/security/2011/dsa-2316
http://www.kb.cert.org/vuls/id/668534 US Government Resource
http://www.quagga.net/download/quagga-0.99.19.changelog.txt
https://bugzilla.redhat.com/show_bug.cgi?id=738400
https://www.cert.fi/en/reports/2011/vulnerability539178.html
http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=94431dbc753171b48b5c6806af97fd690813b00a
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
http://rhn.redhat.com/errata/RHSA-2012-1258.html
http://rhn.redhat.com/errata/RHSA-2012-1259.html
http://secunia.com/advisories/46139 Vendor Advisory
http://secunia.com/advisories/46274
http://secunia.com/advisories/48106
http://security.gentoo.org/glsa/glsa-201202-02.xml
http://www.debian.org/security/2011/dsa-2316
http://www.kb.cert.org/vuls/id/668534 US Government Resource
http://www.quagga.net/download/quagga-0.99.19.changelog.txt
https://bugzilla.redhat.com/show_bug.cgi?id=738400
https://www.cert.fi/en/reports/2011/vulnerability539178.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.17:*:*:*:*:*:*:*

History

21 Nov 2024, 01:30

Type Values Removed Values Added
References () http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=94431dbc753171b48b5c6806af97fd690813b00a - () http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=94431dbc753171b48b5c6806af97fd690813b00a -
References () http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html - () http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html - () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1258.html - () http://rhn.redhat.com/errata/RHSA-2012-1258.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1259.html - () http://rhn.redhat.com/errata/RHSA-2012-1259.html -
References () http://secunia.com/advisories/46139 - Vendor Advisory () http://secunia.com/advisories/46139 - Vendor Advisory
References () http://secunia.com/advisories/46274 - () http://secunia.com/advisories/46274 -
References () http://secunia.com/advisories/48106 - () http://secunia.com/advisories/48106 -
References () http://security.gentoo.org/glsa/glsa-201202-02.xml - () http://security.gentoo.org/glsa/glsa-201202-02.xml -
References () http://www.debian.org/security/2011/dsa-2316 - () http://www.debian.org/security/2011/dsa-2316 -
References () http://www.kb.cert.org/vuls/id/668534 - US Government Resource () http://www.kb.cert.org/vuls/id/668534 - US Government Resource
References () http://www.quagga.net/download/quagga-0.99.19.changelog.txt - () http://www.quagga.net/download/quagga-0.99.19.changelog.txt -
References () https://bugzilla.redhat.com/show_bug.cgi?id=738400 - () https://bugzilla.redhat.com/show_bug.cgi?id=738400 -
References () https://www.cert.fi/en/reports/2011/vulnerability539178.html - () https://www.cert.fi/en/reports/2011/vulnerability539178.html -

07 Nov 2023, 02:08

Type Values Removed Values Added
References
  • {'url': 'http://code.quagga.net/?p=quagga.git;a=commit;h=94431dbc753171b48b5c6806af97fd690813b00a', 'name': 'http://code.quagga.net/?p=quagga.git;a=commit;h=94431dbc753171b48b5c6806af97fd690813b00a', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=94431dbc753171b48b5c6806af97fd690813b00a -

Information

Published : 2011-10-10 10:55

Updated : 2024-11-21 01:30


NVD link : CVE-2011-3327

Mitre link : CVE-2011-3327

CVE.ORG link : CVE-2011-3327


JSON object : View

Products Affected

quagga

  • quagga
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer