Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 192096 - net-misc/quagga < 0.98.6-r3 OPEN message and COMMUNITY attribute DoS (CVE-2007-4826)
Summary: net-misc/quagga < 0.98.6-r3 OPEN message and COMMUNITY attribute DoS (CVE-200...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-09-11 10:07 UTC by Robert Buchholz (RETIRED)
Modified: 2008-01-10 08:41 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2007-09-11 10:07:37 UTC
From http://quagga.net/news2.php?y=2007&m=9&d=7 :

This release fixes two potential DoS conditions in bgpd, reported by Mu Security, where a bgpd could be crashed if a peer sent a malformed OPEN message or a malformed COMMUNITY attribute. Only configured peers can do this, hence we consider these issues to be very low impact.

Patches are linked at Redhat (URL)
Comment 1 Matthias Geerdsen (RETIRED) gentoo-dev 2007-09-11 11:40:52 UTC
mrness, please provide an updated ebuild
Comment 2 Alin Năstac (RETIRED) gentoo-dev 2007-09-11 11:45:56 UTC
I cannot do it until I have an AS4 patch for quagga 0.99.9.
Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2007-09-11 11:58:24 UTC
could you then backport the patches maybe? "several weeks" is a little too long for a security bug

according to the RH bug that should be these:

http://cvs.quagga.net/cgi-bin/viewcvs.cgi/quagga/bgpd/bgp_attr.c.diff?r1=1.23&r2=1.24&diff_format=h

http://cvs.quagga.net/cgi-bin/viewcvs.cgi/quagga/bgpd/bgp_community.c.diff?r1=1.7&r2=1.8&diff_format=h

Comment 4 Alin Năstac (RETIRED) gentoo-dev 2007-09-12 07:31:03 UTC
I've backported those patches in quagga-0.98.6-r3 and quagga-0.99.7-r1.

Arches, please mark quagga-0.98.6-r3 as stable (leave quagga-0.99.7-r1 as is).

@amd64: I know you didn't received a request for stabilization, but could you please do it anyway?
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2007-09-12 16:19:53 UTC
Stable for HPPA.
Comment 6 Robert Buchholz (RETIRED) gentoo-dev 2007-09-12 16:47:57 UTC
This is CVE-2007-4826.
Comment 7 Christian Faulhammer (RETIRED) gentoo-dev 2007-09-13 06:49:56 UTC
x86 stable
Comment 8 Tobias Scherbaum (RETIRED) gentoo-dev 2007-09-13 16:01:24 UTC
ppc stable
Comment 9 Raúl Porcel (RETIRED) gentoo-dev 2007-09-17 09:54:53 UTC
alpha stable, thanks Tobias
Comment 10 Wulf Krueger (RETIRED) gentoo-dev 2007-09-23 19:18:45 UTC
Marked stable on amd64.
Comment 11 Raúl Porcel (RETIRED) gentoo-dev 2007-09-25 19:30:37 UTC
sparc stable
Comment 12 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-09-25 19:39:20 UTC
GLSA request filed.
Comment 13 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-09-26 07:34:26 UTC
hmm, there should be a vote first.
"we consider these issues to be very low impact" => I vote NO.
Comment 14 Alin Năstac (RETIRED) gentoo-dev 2007-09-26 08:05:15 UTC
(In reply to comment #13)
> "we consider these issues to be very low impact" => I vote NO.

I imagine an ISP would be concerned about it. If I would have dozens of BGP peers, I wouldn't want to let my router at the mercy of my peers.
Comment 15 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-09-26 15:57:55 UTC
Thx for the comment Alin. I tend to vote YES.
Comment 16 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-10-02 21:38:30 UTC
I vote no. Very low threat.

Let's suppose that some ISPs could use quagga on Linux (hum....). I don't really think that an ISP could play that in a civilized environment. It would finish in court. 
Comment 17 Alin Năstac (RETIRED) gentoo-dev 2007-10-03 05:52:58 UTC
I agree Linux routers are no match for high end Cisco routers in the terms of processing power (obviously an embedded solution with virtually unlimited numbers of specialized CPUs will always surclass a general purpose OS with up to 8 x86 CPUs). However, I think quagga is used by big boys and the proof of that is the AS4 patch, made and maintained by a RIPE employee. If they aren't using it, why the hell they do that?

I have a grin on my face everytime I hear someone saying they are secure because they have applied all updates from glsa-check. C'mon, this package is very popular among security conscious type of people. How hard could it be to cut-n-paste from other security alerts?
Comment 18 Matt Drew (RETIRED) gentoo-dev 2007-10-11 21:27:41 UTC
mrness: we can't cut and paste from other advisories, they are copyrighted (at least in the U.S.).

A BGP peer router would have to be compromised in order for this to even be possible.  If the upstream router has been compromised, you've got *far* more to worry about than a DoS.

I vote no.
Comment 19 Alin Năstac (RETIRED) gentoo-dev 2007-10-12 05:27:31 UTC
Well, others did their homework and released an advisory. In our parallel world however, this remotely exploitable DoS bug doesn't deserve the hassle of releasing such advisory.

Just close this bug. Happy slacking...
Comment 20 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-10-14 07:53:17 UTC
I've been slacking for sure but matt, p-y, falco and others certainly have not. They're simply overwhelmed by bugs:(

AFAIK if one of your peers are compromised you have far worse things to worry about than DoS.

Voting NO and closing. Feel free to convince me of otherwise and I'll make the draft myself.