CVE-2018-5379
19.02.2018, 13:29
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.Enginsight
Vendor | Product | Version |
---|---|---|
quagga | quagga | 𝑥 ≤ 1.2.2 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_tus | 7.4 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 7.0 |
siemens | ruggedcom_rox_ii_firmware | 𝑥 < 2.13.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References