CVE-2018-5381

The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:08

Type Values Removed Values Added
References () http://savannah.nongnu.org/forum/forum.php?forum_id=9095 - Third Party Advisory () http://savannah.nongnu.org/forum/forum.php?forum_id=9095 - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/940439 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/940439 - Third Party Advisory, US Government Resource
References () https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf - Mitigation, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf - Mitigation, Third Party Advisory
References () https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1975.txt - Vendor Advisory () https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1975.txt - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201804-17 - Third Party Advisory () https://security.gentoo.org/glsa/201804-17 - Third Party Advisory
References () https://usn.ubuntu.com/3573-1/ - Third Party Advisory () https://usn.ubuntu.com/3573-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4115 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4115 - Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 6.5

Information

Published : 2018-02-19 13:29

Updated : 2024-11-21 04:08


NVD link : CVE-2018-5381

Mitre link : CVE-2018-5381

CVE.ORG link : CVE-2018-5381


JSON object : View

Products Affected

siemens

  • ruggedcom_rox_ii_firmware
  • ruggedcom_rox_ii

canonical

  • ubuntu_linux

quagga

  • quagga

debian

  • debian_linux
CWE
CWE-228

Improper Handling of Syntactically Invalid Structure

CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')