CVE-2012-0250
05.04.2012, 13:25
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.Enginsight
Vendor | Product | Version |
---|---|---|
quagga | quagga | 𝑥 ≤ 0.99.20 |
quagga | quagga | 0.99.1 |
quagga | quagga | 0.99.2 |
quagga | quagga | 0.99.3 |
quagga | quagga | 0.99.4 |
quagga | quagga | 0.99.5 |
quagga | quagga | 0.99.6 |
quagga | quagga | 0.99.7 |
quagga | quagga | 0.99.8 |
quagga | quagga | 0.99.9 |
quagga | quagga | 0.99.10 |
quagga | quagga | 0.99.11 |
quagga | quagga | 0.99.12 |
quagga | quagga | 0.99.13 |
quagga | quagga | 0.99.14 |
quagga | quagga | 0.99.15 |
quagga | quagga | 0.99.16 |
quagga | quagga | 0.99.17 |
quagga | quagga | 0.99.18 |
quagga | quagga | 0.99.19 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References