The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0794.html | vendor advisory |
https://security.gentoo.org/glsa/201701-48 | vendor advisory |
http://www.securitytracker.com/id/1035699 | vdb entry |
http://www.openwall.com/lists/oss-security/2016/04/27/7 | mailing list |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00062.html | vendor advisory |
https://lists.quagga.net/pipermail/quagga-dev/2016-January/014699.html | mailing list |
http://www.securityfocus.com/bid/88561 | vdb entry |
https://lists.quagga.net/pipermail/quagga-dev/2016-February/014743.html | mailing list |
http://www.debian.org/security/2016/dsa-3654 | vendor advisory |