Buffer overflow in the ospf_ls_upd_list_lsa function in...
Low severity
Unreviewed
Published
May 4, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Apr 5, 2012
Published to the GitHub Advisory Database
May 4, 2022
Last updated
Feb 1, 2023
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
References