mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 01:02:55 +00:00
97 lines
3.4 KiB
JSON
97 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2013-2236",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "RHSA-2017:0794",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0794.html"
|
|
},
|
|
{
|
|
"name": "60955",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/60955"
|
|
},
|
|
{
|
|
"name": "http://nongnu.mirrors.hostinginnederland.nl//quagga/quagga-0.99.22.3.changelog.txt",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nongnu.mirrors.hostinginnederland.nl//quagga/quagga-0.99.22.3.changelog.txt"
|
|
},
|
|
{
|
|
"name": "http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88"
|
|
},
|
|
{
|
|
"name": "[quagga-dev] 20130702 [quagga-dev 10568] ospfd, new_msg_lsa_change_notify: looks like a buffer overflow",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.quagga.net/pipermail/quagga-dev/2013-July/010622.html"
|
|
},
|
|
{
|
|
"name": "DSA-2803",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2013/dsa-2803"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20130703 Re: CVE request: Quagga OSPF-API stack overrun",
|
|
"refsource": "MLIST",
|
|
"url": "http://seclists.org/oss-sec/2013/q3/24"
|
|
},
|
|
{
|
|
"name": "USN-2941-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "http://www.ubuntu.com/usn/USN-2941-1"
|
|
}
|
|
]
|
|
}
|
|
} |