CVE-2018-5378
19.02.2018, 13:29
The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.Enginsight
Vendor | Product | Version |
---|---|---|
quagga | quagga | 𝑥 ≤ 1.2.2 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References