← Volver a CVEs
CVE-2006-2224
N/ADescripcion
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado5/5/2006
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
quagga:quagga_routing_software_suite
Debilidades (CWE)
CWE-287
Referencias
http://bugzilla.quagga.net/show_bug.cgi?id=262(cve@mitre.org)
http://secunia.com/advisories/19910(cve@mitre.org)
http://secunia.com/advisories/20137(cve@mitre.org)
http://secunia.com/advisories/20138(cve@mitre.org)
http://secunia.com/advisories/20221(cve@mitre.org)
http://secunia.com/advisories/20420(cve@mitre.org)
http://secunia.com/advisories/20421(cve@mitre.org)
http://secunia.com/advisories/20782(cve@mitre.org)
http://secunia.com/advisories/21159(cve@mitre.org)
http://securitytracker.com/id?1016204(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1059(cve@mitre.org)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(cve@mitre.org)
http://www.osvdb.org/25225(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/17808(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(cve@mitre.org)
https://usn.ubuntu.com/284-1/(cve@mitre.org)
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc(af854a3a-2127-422b-91ae-364da2661108)
http://bugzilla.quagga.net/show_bug.cgi?id=262(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19910(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20137(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20138(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20221(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20420(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20421(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20782(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21159(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016204(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1059(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_17_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25225(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17808(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/284-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.