It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
[
{
"id": "CVE-2016-1245-16d8a6bb",
"source": "https://github.com/quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546",
"digest": {
"length": 530.0,
"function_hash": "35130448944641319665980278253845251263"
},
"signature_version": "v1",
"target": {
"function": "rtadv_read",
"file": "zebra/rtadv.c"
},
"signature_type": "Function",
"deprecated": false
},
{
"id": "CVE-2016-1245-3b967512",
"source": "https://github.com/quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546",
"digest": {
"line_hashes": [
"303090784983956718529097018062121597088",
"56358507261596026835733891490005575257",
"77969341907554756356165149074813965963",
"57935677522198402311240165415701137228"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "zebra/rtadv.c"
},
"signature_type": "Line",
"deprecated": false
}
]