Skip to navigation

CVE Database

CVE-2011-3323

Impact: Low
Public: 2011-09-26
Bugzilla: 738393: CVE-2011-3323 Quagga (ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA

Details

The MITRE CVE dictionary describes this issue as:

The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.

Find out more about CVE-2011-3323 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 5.4
Base Metrics: AV:A/AC:M/Au:N/C:P/I:P/A:P
Access Vector: Adjacent Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (quagga) RHSA-2012:1258 September 12, 2012
Red Hat Enterprise Linux version 6 (quagga) RHSA-2012:1259 September 12, 2012

External References

Acknowledgements

Red Hat would like to thank CERT-FI for reporting this issue. CERT-FI acknowledges Riku Hietamäki, Tuomo Untinen and Jukka Taimisto of the Codenomicon CROSS project as the original reporters.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.