Debian Security Advisory

DSA-2104-1 quagga -- several vulnerabilities

Date Reported:
06 Sep 2010
Affected Packages:
quagga
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 594262.
In Mitre's CVE dictionary: CVE-2010-2948, CVE-2010-2949.
More information:

Several remote vulnerabilities have been discovered in the BGP implementation of Quagga, a routing daemon.

The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2010-2948

    When processing a crafted Route Refresh message received from a configured, authenticated BGP neighbor, Quagga may crash, leading to a denial of service.

  • CVE-2010-2949

    When processing certain crafted AS paths, Quagga would crash with a NULL pointer dereference, leading to a denial of service. In some configurations, such crafted AS paths could be relayed by intermediate BGP routers.

In addition, this update contains a reliability fix: Quagga will no longer advertise confederation-related AS paths to non-confederation peers, and reject unexpected confederation-related AS paths by resetting the session with the BGP peer which is advertising them. (Previously, such AS paths would trigger resets of unrelated BGP sessions.)

For the stable distribution (lenny), these problems have been fixed in version 0.99.10-1lenny3.

For the unstable distribution (sid) and the testing distribution (squeeze), these problems have been fixed in version 0.99.17-1.

We recommend that you upgrade your quagga package.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10.orig.tar.gz
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3.diff.gz
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.10-1lenny3_all.deb
Alpha:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_arm.deb
ARM EABI:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_armel.deb
HP Precision:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny3_sparc.deb

MD5 checksums of the listed files are available in the original advisory.