The aspathput function in bgpd/bgpaspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "quagga", "binary_version": "0.99.22.4-3ubuntu1.4" }, { "binary_name": "quagga-dbg", "binary_version": "0.99.22.4-3ubuntu1.4" }, { "binary_name": "quagga-dbgsym", "binary_version": "0.99.22.4-3ubuntu1.4" }, { "binary_name": "quagga-doc", "binary_version": "0.99.22.4-3ubuntu1.4" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "quagga", "binary_version": "0.99.24.1-2ubuntu1.3" }, { "binary_name": "quagga-dbg", "binary_version": "0.99.24.1-2ubuntu1.3" }, { "binary_name": "quagga-dbgsym", "binary_version": "0.99.24.1-2ubuntu1.3" }, { "binary_name": "quagga-doc", "binary_version": "0.99.24.1-2ubuntu1.3" } ] }