ID CVE-2006-2276
Summary bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
References
Vulnerable Configurations
  • cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*
    cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*
  • cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*
    cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 03-10-2018 - 21:40)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-04-29T04:07:25.907-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
family unix
id oval:org.mitre.oval:def:10651
status accepted
submitted 2010-07-09T03:56:16-04:00
title bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
version 29
redhat via4
advisories
  • bugzilla
    id 1618099
    title CVE-2006-2276 security flaw
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 4 is installed
        oval oval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • comment quagga is earlier than 0:0.98.3-2.4E
            oval oval:com.redhat.rhsa:tst:20060525001
          • comment quagga is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060525002
        • AND
          • comment quagga-contrib is earlier than 0:0.98.3-2.4E
            oval oval:com.redhat.rhsa:tst:20060525003
          • comment quagga-contrib is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060525004
        • AND
          • comment quagga-devel is earlier than 0:0.98.3-2.4E
            oval oval:com.redhat.rhsa:tst:20060525005
          • comment quagga-devel is signed with Red Hat master key
            oval oval:com.redhat.rhsa:tst:20060525006
    rhsa
    id RHSA-2006:0525
    released 2006-06-01
    severity Moderate
    title RHSA-2006:0525: quagga security update (Moderate)
  • rhsa
    id RHSA-2006:0533
rpms
  • quagga-0:0.96.2-11.3E
  • quagga-0:0.98.3-2.4E
  • quagga-contrib-0:0.98.3-2.4E
  • quagga-debuginfo-0:0.96.2-11.3E
  • quagga-debuginfo-0:0.98.3-2.4E
  • quagga-devel-0:0.98.3-2.4E
refmap via4
bid 17979
confirm http://www.quagga.net/news2.php?y=2006&m=5&d=4#id1146764580
debian DSA-1059
gentoo GLSA-200605-15
mlist [quagga-dev] 20060329 quagga locks with command sh ip bgp community 1:*
osvdb 25245
sectrack 1016204
secunia
  • 20116
  • 20137
  • 20138
  • 20221
  • 20420
  • 20421
  • 20782
sgi 20060602-01-U
ubuntu USN-284-1
Last major update 03-10-2018 - 21:40
Published 10-05-2006 - 02:14
Last modified 03-10-2018 - 21:40
Back to Top