Short Name |
APP:MISC:QUAGGA-BGP-NOTIFY-OOB |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Quagga BGP Daemon Notify Attribute Out of Bounds Read |
Release Date |
2018/03/13 |
Update Number |
3045 |
Supported Platforms |
idp-4.0+, isg-3.4.139899+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempt tp exploit an out of bounds read vulnerability which has been reported in Quagga BGP Daemon. The vulnerability is due to improper validation of attribute sizes received by BGP peers before responding with the contents of the attribute in a NOTIFY message. Successful exploitation could result in the disclosure of memory contents to the attacker. Unsuccessful exploitation could result in termination of the bgpd process.
The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.