Learn about CVE-2017-16227, a Quagga vulnerability in the aspath_put function allowing remote attackers to cause denial of service through BGP UPDATE messages. Find mitigation steps and affected versions.
Quagga, specifically the aspath_put function in bgpd/bgp_aspath.c, has a vulnerability in versions prior to 1.2.2 that can be exploited by remote attackers through BGP UPDATE messages, resulting in a denial of service.
Understanding CVE-2017-16227
This CVE entry relates to a vulnerability in Quagga's aspath_put function that allows for a denial of service attack through BGP UPDATE messages.
What is CVE-2017-16227?
The vulnerability in Quagga's aspath_put function in bgpd/bgp_aspath.c before version 1.2.2 allows remote attackers to cause a denial of service by sending BGP UPDATE messages. The issue stems from incorrect AS_PATH size calculation for long paths, leading to the creation of an invalid message.
The Impact of CVE-2017-16227
Exploitation of this vulnerability can result in a denial of service, causing affected systems to drop sessions and potentially disrupting network operations.
Technical Details of CVE-2017-16227
This section delves into the technical aspects of the CVE, including the vulnerability description, affected systems, and the exploitation mechanism.
Vulnerability Description
The aspath_put function in Quagga before version 1.2.2 allows remote attackers to trigger a denial of service by manipulating BGP UPDATE messages. The miscalculation of AS_PATH size for long paths leads to the construction of an invalid message.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited remotely by sending specially crafted BGP UPDATE messages, taking advantage of the incorrect AS_PATH size calculation to disrupt network services.
Mitigation and Prevention
Protecting systems from CVE-2017-16227 involves immediate steps and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates