Unrated severityNVD Advisory· Published Feb 19, 2018· Updated Sep 17, 2024
CVE-2018-5379
CVE-2018-5379
Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
Affected products
22- osv-coords21 versionspkg:rpm/opensuse/quagga&distro=openSUSE%20Tumbleweedpkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/quagga&distro=SUSE%20OpenStack%20Cloud%206
< 1.2.4-2.14+ 20 more
- (no CPE)range: < 1.2.4-2.14
- (no CPE)range: < 0.99.15-0.30.3.1
- (no CPE)range: < 0.99.15-0.30.3.1
- (no CPE)range: < 0.99.15-0.30.3.1
- (no CPE)range: < 0.99.15-0.30.3.1
- (no CPE)range: < 0.99.22.1-16.4.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 1.1.1-17.13.1
- (no CPE)range: < 0.99.22.1-16.4.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 0.99.15-0.30.3.1
- (no CPE)range: < 0.99.22.1-16.4.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 1.1.1-17.13.1
- (no CPE)range: < 0.99.15-0.30.3.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 1.1.1-17.7.1
- (no CPE)range: < 1.1.1-17.13.1
- (no CPE)range: < 0.99.22.1-16.4.1
- Quagga/bgpdv5Range: bpgd
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.kb.cert.org/vuls/id/940439mitrethird-party-advisoryx_refsource_CERT-VN
- access.redhat.com/errata/RHSA-2018:0377mitrevendor-advisoryx_refsource_REDHAT
- security.gentoo.org/glsa/201804-17mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/3573-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4115mitrevendor-advisoryx_refsource_DEBIAN
- savannah.nongnu.org/forum/forum.phpmitrex_refsource_CONFIRM
- www.securityfocus.com/bid/103105mitrevdb-entryx_refsource_BID
- cert-portal.siemens.com/productcert/pdf/ssa-451142.pdfmitrex_refsource_CONFIRM
- gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txtmitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/02/msg00021.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.