← Zuruck zu CVEs
CVE-2006-2224
N/ABeschreibung
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht5/5/2006
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
quagga:quagga_routing_software_suite
Schwachen (CWE)
CWE-287
Referenzen
http://bugzilla.quagga.net/show_bug.cgi?id=262(cve@mitre.org)
http://secunia.com/advisories/19910(cve@mitre.org)
http://secunia.com/advisories/20137(cve@mitre.org)
http://secunia.com/advisories/20138(cve@mitre.org)
http://secunia.com/advisories/20221(cve@mitre.org)
http://secunia.com/advisories/20420(cve@mitre.org)
http://secunia.com/advisories/20421(cve@mitre.org)
http://secunia.com/advisories/20782(cve@mitre.org)
http://secunia.com/advisories/21159(cve@mitre.org)
http://securitytracker.com/id?1016204(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1059(cve@mitre.org)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(cve@mitre.org)
http://www.osvdb.org/25225(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/17808(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(cve@mitre.org)
https://usn.ubuntu.com/284-1/(cve@mitre.org)
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc(af854a3a-2127-422b-91ae-364da2661108)
http://bugzilla.quagga.net/show_bug.cgi?id=262(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19910(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20137(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20138(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20221(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20420(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20421(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20782(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21159(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016204(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1059(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_17_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25225(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17808(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/284-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.