← Back to CVEs
CVE-2006-2224
N/ADescription
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
CVE Details
CVSS v3.1 ScoreN/A
Published5/5/2006
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
quagga:quagga_routing_software_suite
Weaknesses (CWE)
CWE-287
References
http://bugzilla.quagga.net/show_bug.cgi?id=262(cve@mitre.org)
http://secunia.com/advisories/19910(cve@mitre.org)
http://secunia.com/advisories/20137(cve@mitre.org)
http://secunia.com/advisories/20138(cve@mitre.org)
http://secunia.com/advisories/20221(cve@mitre.org)
http://secunia.com/advisories/20420(cve@mitre.org)
http://secunia.com/advisories/20421(cve@mitre.org)
http://secunia.com/advisories/20782(cve@mitre.org)
http://secunia.com/advisories/21159(cve@mitre.org)
http://securitytracker.com/id?1016204(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1059(cve@mitre.org)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(cve@mitre.org)
http://www.osvdb.org/25225(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/17808(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(cve@mitre.org)
https://usn.ubuntu.com/284-1/(cve@mitre.org)
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc(af854a3a-2127-422b-91ae-364da2661108)
http://bugzilla.quagga.net/show_bug.cgi?id=262(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19910(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20137(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20138(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20221(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20420(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20421(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20782(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21159(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016204(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1059(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_17_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25225(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17808(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/284-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.