CVE-2018-5379

Impact:
Important
Public Date:
2018-02-15
CWE:
CWE-416
Bugzilla:
1542985: CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code
A double-free vulnerability was found in Quagga. A BGP peer could send a specially crafted UPDATE message which would cause allocated blocks of memory to be free()d more than once, potentially leading to a crash or other issues.

Find out more about CVE-2018-5379 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Glibc's heap protection mitigations render this issue more difficult to exploit, though bypasses may still be possible.

CVSS v3 metrics

CVSS3 Base Score 8.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (quagga) RHSA-2018:0377 2018-02-28

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 quagga Will not fix
Red Hat Enterprise Linux 5 quagga Will not fix

Acknowledgements

Red Hat would like to thank the Quagga project for reporting this issue.

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.