CVE Database


Impact: Moderate
Public: 2011-09-26
Bugzilla: 738400: CVE-2011-3327 Quagga (bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes


The MITRE CVE dictionary describes this issue as:

Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.

Find out more about CVE-2011-3327 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 5.4
Base Metrics: AV:A/AC:M/Au:N/C:P/I:P/A:P
Access Vector: Adjacent Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (quagga) RHSA-2012:1258 September 12, 2012
Red Hat Enterprise Linux version 6 (quagga) RHSA-2012:1259 September 12, 2012

External References


Red Hat would like to thank CERT-FI for reporting this issue. CERT-FI acknowledges Riku Hietamäki, Tuomo Untinen and Jukka Taimisto of the Codenomicon CROSS project as the original reporters.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.