commit | 94431dbc753171b48b5c6806af97fd690813b00a | [log] [tgz] |
---|---|---|
author | CROSS <info@codenomicon.com> | Mon Sep 26 13:17:05 2011 +0400 |
committer | Denis Ovsienko <infrastation@yandex.ru> | Mon Sep 26 18:46:16 2011 +0400 |
tree | 463b917f9f80236be01e4502863b34ae2d52b53d | |
parent | a0bf59bcac8b40c3f83e7f2e7f65087ece6acfc7 [diff] |
bgpd: CVE-2011-3327 (ext. comm. buffer overflow) This vulnerability (CERT-FI #513254) was reported by CROSS project. They have also suggested a fix to the problem, which was found acceptable. The problem occurs when bgpd receives an UPDATE message containing 255 unknown AS_PATH attributes in Path Attribute Extended Communities. This causes a buffer overlow in bgpd. * bgp_ecommunity.c * ecommunity_ecom2str(): perform size check earlier