Critical severity9.8NVD Advisory· Published Feb 22, 2017· Updated May 13, 2026
CVE-2016-1245
CVE-2016-1245
Description
It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
Affected products
1- Range: Quagga before 1.0.20161017
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546nvdPatchThird Party Advisory
- www.gossamer-threads.com/lists/quagga/users/31952nvdMailing ListMitigationThird Party Advisory
- www.securityfocus.com/bid/93775nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- www.debian.org/security/2016/dsa-3695nvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2017-0794.htmlnvd
- security.gentoo.org/glsa/201701-48nvd
News mentions
0No linked articles in our index yet.