CVE-2017-5495

Priority
Low
Description
All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded
memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service
of Quagga daemons, or even the entire host. When Quagga daemons are
configured with their telnet CLI enabled, anyone who can connect to the TCP
ports can trigger this vulnerability, prior to authentication. Most
distributions restrict the Quagga telnet interface to local access only by
default. The Quagga telnet interface 'vty' input buffer grows
automatically, without bound, so long as a newline is not entered. This
allows an attacker to cause the Quagga daemon to allocate unbounded memory
by sending very long strings without a newline. Eventually the daemon is
terminated by the system, or the system itself runs out of memory. This is
fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite
2017-01-10.
References
Bugs
Notes
 tyhicks> The telnet 'vty' CLI is not configured to listen for remote
  connections by default
Assigned-to
mdeslaur
Package
Upstream:released (1.1.1)
Ubuntu 17.10 (Artful Aardvark):not-affected (1.1.1-3)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.1.1-3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):released (0.99.22.4-3ubuntu1.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.99.24.1-2ubuntu1.3)
Ubuntu 17.04 (Zesty Zapus):not-affected (1.1.1-1)
Patches:
Upstream:http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=b7ceefea77a246fe5c1dcd1b91bf6079d1b97c02
Upstream:http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=7d66284a5817a1613b1e4d64a0775ec04fdf8c01
More Information

Updated: 2017-10-31 19:14:36 UTC (commit 13616)