← Retour aux CVEs
CVE-2006-2224
N/ADescription
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
Details CVE
Score CVSS v3.1N/A
Publie5/5/2006
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
quagga:quagga_routing_software_suite
Faiblesses (CWE)
CWE-287
References
http://bugzilla.quagga.net/show_bug.cgi?id=262(cve@mitre.org)
http://secunia.com/advisories/19910(cve@mitre.org)
http://secunia.com/advisories/20137(cve@mitre.org)
http://secunia.com/advisories/20138(cve@mitre.org)
http://secunia.com/advisories/20221(cve@mitre.org)
http://secunia.com/advisories/20420(cve@mitre.org)
http://secunia.com/advisories/20421(cve@mitre.org)
http://secunia.com/advisories/20782(cve@mitre.org)
http://secunia.com/advisories/21159(cve@mitre.org)
http://securitytracker.com/id?1016204(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1059(cve@mitre.org)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(cve@mitre.org)
http://www.osvdb.org/25225(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/17808(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(cve@mitre.org)
https://usn.ubuntu.com/284-1/(cve@mitre.org)
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc(af854a3a-2127-422b-91ae-364da2661108)
http://bugzilla.quagga.net/show_bug.cgi?id=262(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19910(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20137(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20138(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20221(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20420(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20421(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20782(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21159(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016204(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1059(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_17_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25225(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0525.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0533.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432823/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/432856/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17808(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26251(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/284-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.