The aspathput function in bgpd/bgpaspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.99.22.4-3ubuntu1.4", "binary_name": "quagga" }, { "binary_version": "0.99.22.4-3ubuntu1.4", "binary_name": "quagga-dbg" }, { "binary_version": "0.99.22.4-3ubuntu1.4", "binary_name": "quagga-dbgsym" }, { "binary_version": "0.99.22.4-3ubuntu1.4", "binary_name": "quagga-doc" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.99.24.1-2ubuntu1.3", "binary_name": "quagga" }, { "binary_version": "0.99.24.1-2ubuntu1.3", "binary_name": "quagga-dbg" }, { "binary_version": "0.99.24.1-2ubuntu1.3", "binary_name": "quagga-dbgsym" }, { "binary_version": "0.99.24.1-2ubuntu1.3", "binary_name": "quagga-doc" } ] }