bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://usn.ubuntu.com/284-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
http://www.quagga.net/news2.php?y=2006&m=5&d=4#id1146764580 | x_refsource_CONFIRM x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10651 | vdb-entry signature x_refsource_OVAL x_transferred |
http://www.osvdb.org/25245 | vdb-entry x_refsource_OSVDB x_transferred |
http://secunia.com/advisories/20782 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20138 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20421 | third-party-advisory x_refsource_SECUNIA x_transferred |
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc | vendor-advisory x_refsource_SGI x_transferred |
http://www.redhat.com/support/errata/RHSA-2006-0525.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://secunia.com/advisories/20137 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://lists.quagga.net/pipermail/quagga-dev/2006-March/004052.html | mailing-list x_refsource_MLIST x_transferred |
http://securitytracker.com/id?1016204 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.redhat.com/support/errata/RHSA-2006-0533.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml | vendor-advisory x_refsource_GENTOO x_transferred |
http://www.debian.org/security/2006/dsa-1059 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://secunia.com/advisories/20221 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20116 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/20420 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/17979 | vdb-entry x_refsource_BID x_transferred |
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.9 | MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.