CVE-2017-16227

NameCVE-2017-16227
DescriptionThe aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1152-1, DSA-4011-1
NVD severitymedium
Debian Bugs879474

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
quagga (PTS)jessie (security), jessie0.99.23.1-1+deb8u5fixed
stretch (security), stretch1.1.1-3+deb9u2fixed
buster1.2.4-3fixed
bullseye, sid1.2.4-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
quaggasource(unstable)1.2.2-1879474
quaggasourcejessie0.99.23.1-1+deb8u4DSA-4011-1
quaggasourcestretch1.1.1-3+deb9u1DSA-4011-1
quaggasourcewheezy0.99.22.4-1+wheezy3+deb7u2DLA-1152-1

Notes

https://lists.quagga.net/pipermail/quagga-dev/2017-September/033284.html
http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=7a42b78be9a4108d98833069a88e6fddb9285008

Search for package or bug name: Reporting problems