Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-5378
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
内存缓冲区边界内操作的限制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Quagga BGP daemon 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Quagga BGP daemon(bgpd)是一系列守护进程(daemon)的集合,由核心守护进程zebra进行管理,主要用于实现与运行相同路由协议的对等节点之间进行路由信息交换。bgpd是其中的一个实现BGP4+(包括对组播地址族和IPv6地址族的支持)的守护进程(daemon)。 Quagga bgpd 1.2.3之前版本中存在缓冲区错误漏洞,该漏洞源于程序没有正确的对数据执行边界检测。远程攻击者可利用该漏洞读取bgpd进程的内存或造成bgpd崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Quaggabgpd bpgd ~ 1.2.3 -
II. Public POCs for CVE-2018-5378
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-5378
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2018-5378

No comments yet


Leave a comment