CVE-2006-2223

RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://bugzilla.quagga.net/show_bug.cgi?id=261
http://secunia.com/advisories/19910 Patch Vendor Advisory
http://secunia.com/advisories/20137 Vendor Advisory
http://secunia.com/advisories/20138 Vendor Advisory
http://secunia.com/advisories/20221 Vendor Advisory
http://secunia.com/advisories/20420 Vendor Advisory
http://secunia.com/advisories/20421 Vendor Advisory
http://secunia.com/advisories/20782 Vendor Advisory
http://secunia.com/advisories/21159 Vendor Advisory
http://securitytracker.com/id?1016204
http://www.debian.org/security/2006/dsa-1059
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.osvdb.org/25224
http://www.redhat.com/support/errata/RHSA-2006-0525.html
http://www.redhat.com/support/errata/RHSA-2006-0533.html
http://www.securityfocus.com/archive/1/432822/100/0/threaded
http://www.securityfocus.com/archive/1/432823/100/0/threaded
http://www.securityfocus.com/bid/17808 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26243
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985
https://usn.ubuntu.com/284-1/
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://bugzilla.quagga.net/show_bug.cgi?id=261
http://secunia.com/advisories/19910 Patch Vendor Advisory
http://secunia.com/advisories/20137 Vendor Advisory
http://secunia.com/advisories/20138 Vendor Advisory
http://secunia.com/advisories/20221 Vendor Advisory
http://secunia.com/advisories/20420 Vendor Advisory
http://secunia.com/advisories/20421 Vendor Advisory
http://secunia.com/advisories/20782 Vendor Advisory
http://secunia.com/advisories/21159 Vendor Advisory
http://securitytracker.com/id?1016204
http://www.debian.org/security/2006/dsa-1059
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.osvdb.org/25224
http://www.redhat.com/support/errata/RHSA-2006-0525.html
http://www.redhat.com/support/errata/RHSA-2006-0533.html
http://www.securityfocus.com/archive/1/432822/100/0/threaded
http://www.securityfocus.com/archive/1/432823/100/0/threaded
http://www.securityfocus.com/bid/17808 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/26243
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985
https://usn.ubuntu.com/284-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*
cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc -
References () http://bugzilla.quagga.net/show_bug.cgi?id=261 - () http://bugzilla.quagga.net/show_bug.cgi?id=261 -
References () http://secunia.com/advisories/19910 - Patch, Vendor Advisory () http://secunia.com/advisories/19910 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20137 - Vendor Advisory () http://secunia.com/advisories/20137 - Vendor Advisory
References () http://secunia.com/advisories/20138 - Vendor Advisory () http://secunia.com/advisories/20138 - Vendor Advisory
References () http://secunia.com/advisories/20221 - Vendor Advisory () http://secunia.com/advisories/20221 - Vendor Advisory
References () http://secunia.com/advisories/20420 - Vendor Advisory () http://secunia.com/advisories/20420 - Vendor Advisory
References () http://secunia.com/advisories/20421 - Vendor Advisory () http://secunia.com/advisories/20421 - Vendor Advisory
References () http://secunia.com/advisories/20782 - Vendor Advisory () http://secunia.com/advisories/20782 - Vendor Advisory
References () http://secunia.com/advisories/21159 - Vendor Advisory () http://secunia.com/advisories/21159 - Vendor Advisory
References () http://securitytracker.com/id?1016204 - () http://securitytracker.com/id?1016204 -
References () http://www.debian.org/security/2006/dsa-1059 - () http://www.debian.org/security/2006/dsa-1059 -
References () http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml - () http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml -
References () http://www.novell.com/linux/security/advisories/2006_17_sr.html - () http://www.novell.com/linux/security/advisories/2006_17_sr.html -
References () http://www.osvdb.org/25224 - () http://www.osvdb.org/25224 -
References () http://www.redhat.com/support/errata/RHSA-2006-0525.html - () http://www.redhat.com/support/errata/RHSA-2006-0525.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0533.html - () http://www.redhat.com/support/errata/RHSA-2006-0533.html -
References () http://www.securityfocus.com/archive/1/432822/100/0/threaded - () http://www.securityfocus.com/archive/1/432822/100/0/threaded -
References () http://www.securityfocus.com/archive/1/432823/100/0/threaded - () http://www.securityfocus.com/archive/1/432823/100/0/threaded -
References () http://www.securityfocus.com/bid/17808 - Exploit, Patch () http://www.securityfocus.com/bid/17808 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26243 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26243 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9985 -
References () https://usn.ubuntu.com/284-1/ - () https://usn.ubuntu.com/284-1/ -

Information

Published : 2006-05-05 19:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2223

Mitre link : CVE-2006-2223

CVE.ORG link : CVE-2006-2223


JSON object : View

Products Affected

quagga

  • quagga
CWE
CWE-20

Improper Input Validation