CVE-2018-5379

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
References
Link Resource
http://savannah.nongnu.org/forum/forum.php?forum_id=9095 Third Party Advisory
http://www.kb.cert.org/vuls/id/940439 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/103105 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0377 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf Third Party Advisory
https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201804-17 Third Party Advisory
https://usn.ubuntu.com/3573-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4115 Third Party Advisory
http://savannah.nongnu.org/forum/forum.php?forum_id=9095 Third Party Advisory
http://www.kb.cert.org/vuls/id/940439 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/103105 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0377 Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf Third Party Advisory
https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201804-17 Third Party Advisory
https://usn.ubuntu.com/3573-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4115 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:08

Type Values Removed Values Added
References () http://savannah.nongnu.org/forum/forum.php?forum_id=9095 - Third Party Advisory () http://savannah.nongnu.org/forum/forum.php?forum_id=9095 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/940439 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/940439 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/103105 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103105 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0377 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0377 - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf - Third Party Advisory
References () https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt - Vendor Advisory () https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201804-17 - Third Party Advisory () https://security.gentoo.org/glsa/201804-17 - Third Party Advisory
References () https://usn.ubuntu.com/3573-1/ - Third Party Advisory () https://usn.ubuntu.com/3573-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4115 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4115 - Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.5

Information

Published : 2018-02-19 13:29

Updated : 2024-11-21 04:08


NVD link : CVE-2018-5379

Mitre link : CVE-2018-5379

CVE.ORG link : CVE-2018-5379


JSON object : View

Products Affected

siemens

  • ruggedcom_rox_ii_firmware
  • ruggedcom_rox_ii

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_server_eus
  • enterprise_linux_server
  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus

quagga

  • quagga

debian

  • debian_linux
CWE
CWE-415

Double Free