CVE-2012-0255
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
05/04/2012
Last modified:
11/04/2025
Description
The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:* | 0.99.20 (including) | |
| cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078794.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078926.html
- http://rhn.redhat.com/errata/RHSA-2012-1259.html
- http://secunia.com/advisories/48949
- http://www.debian.org/security/2012/dsa-2459
- http://www.kb.cert.org/vuls/id/551715
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078794.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078926.html
- http://rhn.redhat.com/errata/RHSA-2012-1259.html
- http://secunia.com/advisories/48949
- http://www.debian.org/security/2012/dsa-2459
- http://www.kb.cert.org/vuls/id/551715



