Vulnerability Description
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quagga | Quagga | <= 0.99.18 |
Related Weaknesses (CWE)
References
- http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=abc7ef44ca05493500865ce81f7b
- http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2012-1258.html
- http://rhn.redhat.com/errata/RHSA-2012-1259.html
- http://secunia.com/advisories/46139Vendor Advisory
- http://secunia.com/advisories/46274
- http://secunia.com/advisories/48106
- http://security.gentoo.org/glsa/glsa-201202-02.xml
- http://www.debian.org/security/2011/dsa-2316
- http://www.kb.cert.org/vuls/id/668534US Government Resource
- http://www.quagga.net/download/quagga-0.99.19.changelog.txt
- https://www.cert.fi/en/reports/2011/vulnerability539178.html
FAQ
What is CVE-2011-3323?
CVE-2011-3323 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an...
How severe is CVE-2011-3323?
CVE-2011-3323 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3323?
Check the references section above for vendor advisories and patch information. Affected products include: Quagga Quagga.