Unrated severityNVD Advisory· Published May 5, 2006· Updated Apr 16, 2026
CVE-2006-2223
CVE-2006-2223
Description
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
Affected products
2cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
23- secunia.com/advisories/19910nvdPatchVendor Advisory
- www.securityfocus.com/bid/17808nvdExploitPatch
- secunia.com/advisories/20137nvdVendor Advisory
- secunia.com/advisories/20138nvdVendor Advisory
- secunia.com/advisories/20221nvdVendor Advisory
- secunia.com/advisories/20420nvdVendor Advisory
- secunia.com/advisories/20421nvdVendor Advisory
- secunia.com/advisories/20782nvdVendor Advisory
- secunia.com/advisories/21159nvdVendor Advisory
- patches.sgi.com/support/free/security/advisories/20060602-01-U.ascnvd
- bugzilla.quagga.net/show_bug.cginvd
- securitytracker.com/idnvd
- www.debian.org/security/2006/dsa-1059nvd
- www.gentoo.org/security/en/glsa/glsa-200605-15.xmlnvd
- www.novell.com/linux/security/advisories/2006_17_sr.htmlnvd
- www.osvdb.org/25224nvd
- www.redhat.com/support/errata/RHSA-2006-0525.htmlnvd
- www.redhat.com/support/errata/RHSA-2006-0533.htmlnvd
- www.securityfocus.com/archive/1/432822/100/0/threadednvd
- www.securityfocus.com/archive/1/432823/100/0/threadednvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26243nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985nvd
- usn.ubuntu.com/284-1/nvd
News mentions
0No linked articles in our index yet.