CVE-2017-5495 (retired)

Priority
Description
All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded
memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service
of Quagga daemons, or even the entire host. When Quagga daemons are
configured with their telnet CLI enabled, anyone who can connect to the TCP
ports can trigger this vulnerability, prior to authentication. Most
distributions restrict the Quagga telnet interface to local access only by
default. The Quagga telnet interface 'vty' input buffer grows
automatically, without bound, so long as a newline is not entered. This
allows an attacker to cause the Quagga daemon to allocate unbounded memory
by sending very long strings without a newline. Eventually the daemon is
terminated by the system, or the system itself runs out of memory. This is
fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite
2017-01-10.
Assigned-to
mdeslaur
Notes
tyhicksThe telnet 'vty' CLI is not configured to listen for remote
connections by default
Package
Upstream:released (1.1.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.99.24.1-2ubuntu1.3)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.1.1-3)
Patches:
Upstream:http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=b7ceefea77a246fe5c1dcd1b91bf6079d1b97c02
Upstream:http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=7d66284a5817a1613b1e4d64a0775ec04fdf8c01
More Information

Updated: 2019-10-09 08:01:05 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)