Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-5379
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
双重释放
Source: NVD (National Vulnerability Database)
Vulnerability Title
Quagga BGP daemon 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Quagga BGP daemon(bgpd)是一系列守护进程(daemon)的集合,由核心守护进程zebra进行管理,主要用于实现与运行相同路由协议的对等节点之间进行路由信息交换。bgpd是其中的一个实现BGP4+(包括对组播地址族和IPv6地址族的支持)的守护进程(daemon)。 Quagga bgpd 1.2.3之前版本中存在安全漏洞。远程攻击者可利用该漏洞造成拒绝服务或执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Quaggabgpd bpgd ~ 1.2.3 -
II. Public POCs for CVE-2018-5379
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-5379
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2018-5379

No comments yet


Leave a comment