CVE-2018-5381

Publication date 13 February 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.

Read the notes from the security team

Status

Package Ubuntu Release Status
quagga 17.10 artful
Fixed 1.1.1-3ubuntu0.2
16.04 LTS xenial
Fixed 0.99.24.1-2ubuntu1.4
14.04 LTS trusty
Fixed 0.99.22.4-3ubuntu1.5

Notes


mdeslaur

this is Quagga-2018-1975

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-3573-1
    • Quagga vulnerabilities
    • 16 February 2018

Other references