Vulnerability Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quagga | Quagga | <= 1.2.2 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.4 |
| Redhat | Enterprise Linux Server Eus | 7.4 |
| Redhat | Enterprise Linux Server Tus | 7.4 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Siemens | Ruggedcom Rox Ii Firmware | < 2.13.0 |
| Siemens | Ruggedcom Rox Ii | - |
Related Weaknesses (CWE)
References
- http://savannah.nongnu.org/forum/forum.php?forum_id=9095Third Party Advisory
- http://www.kb.cert.org/vuls/id/940439Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/103105Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0377Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdfThird Party Advisory
- https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.tVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/02/msg00021.htmlMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201804-17Third Party Advisory
- https://usn.ubuntu.com/3573-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4115Third Party Advisory
- http://savannah.nongnu.org/forum/forum.php?forum_id=9095Third Party Advisory
- http://www.kb.cert.org/vuls/id/940439Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/103105Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0377Third Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdfThird Party Advisory
FAQ
What is CVE-2018-5379?
CVE-2018-5379 is a vulnerability with a CVSS score of 7.5 (HIGH). The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could...
How severe is CVE-2018-5379?
CVE-2018-5379 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-5379?
Check the references section above for vendor advisories and patch information. Affected products include: Quagga Quagga, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.