CVE-2016-1245

Published on: 02/22/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.

  • CVE-2016-1245 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
1386109 – (CVE-2016-1245) CVE-2016-1245 quagga: Buffer Overflow in IPv6 RA handling Issue Tracking
Third Party Advisory
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1386109
Mailing List Archive: Quagga CVE Released: CVE-2016-1245 (Fix in latest 1.0.20161017 release) Mailing List
Mitigation
Third Party Advisory
www.gossamer-threads.com
text/html
URL Logo CONFIRM www.gossamer-threads.com/lists/quagga/users/31952
Quagga: Multiple vulnerabilities (GLSA 201701-48) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-48
Debian -- Security Information -- DSA-3695-1 quagga Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3695
zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245) · Quagga/[email protected] · GitHub Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546
Quagga CVE-2016-1245 Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93775
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2017:0794

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationQuaggaQuaggaAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*: