Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:MISC:QUAGGA-BGP-NOTIFY-OOB

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

APP

Keywords

Quagga BGP Daemon Notify Attribute Out of Bounds Read

Release Date

2018/03/13

Update Number

3045

Supported Platforms

idp-4.0+, isg-3.4.139899+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: Quagga BGP Daemon Notify Attribute Out of Bounds Read


This signature detects attempt tp exploit an out of bounds read vulnerability which has been reported in Quagga BGP Daemon. The vulnerability is due to improper validation of attribute sizes received by BGP peers before responding with the contents of the attribute in a NOTIFY message. Successful exploitation could result in the disclosure of memory contents to the attacker. Unsuccessful exploitation could result in termination of the bgpd process.

Extended Description

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

Affected Products

  • Canonical ubuntu_linux 14.04
  • Canonical ubuntu_linux 16.04
  • Canonical ubuntu_linux 17.10
  • Debian debian_linux 8.0
  • Debian debian_linux 9.0
  • Quagga quagga 1.2.2

References

  • CVE: CVE-2018-5378

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out