APP: Quagga BGP Daemon bgp_update_receive Double Free

This signature detects attempts to exploit a known vulnerability in the BGP Daemon of Quagga. Successful exploitation could result in the execution of arbitrary code under the security context of the target process. Unsuccessful exploitation could result in the termination of the bgpd process.

Extended Description

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.

Affected Products

Redhat enterprise_linux_workstation

References

BugTraq: 103105

CVE: CVE-2018-5379

Short Name
APP:MISC:QUAGGA-BGP-DOUBLE-FREE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
BGP CVE-2018-5379 Daemon Double Free Quagga bgp_update_receive bid:103105
Release Date
04/05/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Quagga

Debian

Redhat

Canonical

CVSS Score

7.5

Found a potential security threat?