BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
[
{
"id": "CVE-2019-16159-19bde9a3",
"signature_type": "Line",
"source": "https://gitlab.nic.cz/labs/bird@8388f5a7e14108a1458fea35bfbb5a453e2c563c",
"target": {
"file": "proto/bgp/packets.c"
},
"digest": {
"line_hashes": [
"216893417837476986888965276365877246422",
"223445219091451626815491961387763006748",
"321385252695183225000492290604323630133",
"240393356610038048681844503473819906720",
"4383943790272205345412568721163061337",
"276441775111768339359338816026274139390",
"84258977817401017440276937716070434403",
"295253454909988706774094035716076630568"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false
},
{
"id": "CVE-2019-16159-62d9e0ec",
"signature_type": "Function",
"source": "https://gitlab.nic.cz/labs/bird@8388f5a7e14108a1458fea35bfbb5a453e2c563c",
"target": {
"function": "bgp_handle_message",
"file": "proto/bgp/packets.c"
},
"digest": {
"length": 448.0,
"function_hash": "130779972019287339614087948162341524144"
},
"signature_version": "v1",
"deprecated": false
},
{
"id": "CVE-2019-16159-c1c649bd",
"signature_type": "Line",
"source": "https://gitlab.nic.cz/labs/bird@1657c41c96b3c07d9265b07dd4912033ead4124b",
"target": {
"file": "proto/bgp/packets.c"
},
"digest": {
"line_hashes": [
"216893417837476986888965276365877246422",
"223445219091451626815491961387763006748",
"321385252695183225000492290604323630133",
"240393356610038048681844503473819906720",
"255920384722461930579550090089086617062",
"38099894567800398323843450381818194066",
"84125401342413400062944322038071946879",
"70697898021381015989562920937856652083"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false
},
{
"id": "CVE-2019-16159-ffdc3bfd",
"signature_type": "Function",
"source": "https://gitlab.nic.cz/labs/bird@1657c41c96b3c07d9265b07dd4912033ead4124b",
"target": {
"function": "bgp_handle_message",
"file": "proto/bgp/packets.c"
},
"digest": {
"length": 448.0,
"function_hash": "130779972019287339614087948162341524144"
},
"signature_version": "v1",
"deprecated": false
}
]