Vulnerability Details : CVE-2010-2948
Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.
Vulnerability category: OverflowExecute codeDenial of service
Threat overview for CVE-2010-2948
Top countries where our scanners detected CVE-2010-2948
Top open port discovered on systems with this issue
2601
IPs affected by CVE-2010-2948 1,043
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-2948!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-2948
Probability of exploitation activity in the next 30 days: 5.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2948
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2010-2948
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2948
-
http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3
-
http://www.debian.org/security/2010/dsa-2104
Debian -- Security Information -- DSA-2104-1 quagga
-
http://www.redhat.com/support/errata/RHSA-2010-0785.html
Support
-
http://www.vupen.com/english/advisories/2010/3124
Webmail | OVH- OVHVendor Advisory
-
http://secunia.com/advisories/48106
Sign in
-
http://www.securityfocus.com/bid/42635
Quagga bgpd Route-Refresh Message Stack Buffer Overflow Vulnerability
-
http://www.vupen.com/english/advisories/2010/3097
Webmail | OVH- OVH
-
http://www.openwall.com/lists/oss-security/2010/08/25/4
oss-security - Re: CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request
-
http://www.vupen.com/english/advisories/2010/2304
Webmail | OVH- OVHVendor Advisory
-
http://security.gentoo.org/glsa/glsa-201202-02.xml
Quagga: Multiple vulnerabilities (GLSA 201202-02) — Gentoo security
-
http://www.redhat.com/support/errata/RHSA-2010-0945.html
Support
-
http://www.openwall.com/lists/oss-security/2010/08/24/3
oss-security - CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request
-
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:022
-
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
[security-announce] SUSE-SU-2011:1316-1: important: Security update for
- http://www.quagga.net/news2.php?y=2010&m=8&d=19
-
http://www.ubuntu.com/usn/USN-1027-1
USN-1027-1: Quagga vulnerabilities | Ubuntu security notices
-
https://bugzilla.redhat.com/show_bug.cgi?id=626783
626783 – (CVE-2010-2948) CVE-2010-2948 Quagga (bgpd): Stack buffer overflow by processing certain Route-Refresh messages
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:174
mandriva.com
Products affected by CVE-2010-2948
- cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*
- cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*