CVE-2012-0250
Published: 5 April 2012
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
Priority
Status
Package | Release | Status |
---|---|---|
quagga Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(0.99.20.1-0ubuntu0.10.04.2)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Released
(0.99.20.1-0ubuntu0.11.04.2)
|
|
oneiric |
Released
(0.99.20.1-0ubuntu0.11.10.2)
|
|
precise |
Released
(0.99.20.1-0ubuntu0.12.04.2)
|
|
upstream |
Released
(0.99.20.1-1)
|