CVE-2006-2224
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
05/05/2006
Last modified:
03/04/2025
Description
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:quagga:quagga_routing_software_suite:*:*:*:*:*:*:*:* | 0.99.3 (including) | |
| cpe:2.3:a:quagga:quagga_routing_software_suite:0.95:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga_routing_software_suite:0.96.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga_routing_software_suite:0.96.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga_routing_software_suite:0.98.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
- http://bugzilla.quagga.net/show_bug.cgi?id=262
- http://secunia.com/advisories/19910
- http://secunia.com/advisories/20137
- http://secunia.com/advisories/20138
- http://secunia.com/advisories/20221
- http://secunia.com/advisories/20420
- http://secunia.com/advisories/20421
- http://secunia.com/advisories/20782
- http://secunia.com/advisories/21159
- http://securitytracker.com/id?1016204=
- http://www.debian.org/security/2006/dsa-1059
- http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
- http://www.novell.com/linux/security/advisories/2006_17_sr.html
- http://www.osvdb.org/25225
- http://www.redhat.com/support/errata/RHSA-2006-0525.html
- http://www.redhat.com/support/errata/RHSA-2006-0533.html
- http://www.securityfocus.com/archive/1/432823/100/0/threaded
- http://www.securityfocus.com/archive/1/432856/100/0/threaded
- http://www.securityfocus.com/bid/17808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26251
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775
- https://usn.ubuntu.com/284-1/
- ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
- http://bugzilla.quagga.net/show_bug.cgi?id=262
- http://secunia.com/advisories/19910
- http://secunia.com/advisories/20137
- http://secunia.com/advisories/20138
- http://secunia.com/advisories/20221
- http://secunia.com/advisories/20420
- http://secunia.com/advisories/20421
- http://secunia.com/advisories/20782
- http://secunia.com/advisories/21159
- http://securitytracker.com/id?1016204=
- http://www.debian.org/security/2006/dsa-1059
- http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
- http://www.novell.com/linux/security/advisories/2006_17_sr.html
- http://www.osvdb.org/25225
- http://www.redhat.com/support/errata/RHSA-2006-0525.html
- http://www.redhat.com/support/errata/RHSA-2006-0533.html
- http://www.securityfocus.com/archive/1/432823/100/0/threaded
- http://www.securityfocus.com/archive/1/432856/100/0/threaded
- http://www.securityfocus.com/bid/17808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26251
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775
- https://usn.ubuntu.com/284-1/



