The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2003-305.html | patch vendor advisory |
http://marc.info/?l=bugtraq&m=106883387304266&w=2 | mailing list |
http://www.debian.org/security/2004/dsa-415 | patch vendor advisory |
http://secunia.com/advisories/10563 | third party advisory vendor advisory |
http://www.redhat.com/support/errata/RHSA-2003-307.html | patch vendor advisory |