Description
The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jonny Robertson · textdoslinux
https://www.exploit-db.com/exploits/23375
References (5)
Core 5
Core References
Patch, Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2003-305.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=106883387304266&w=2
Patch, Vendor Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2004/dsa-415
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10563
Patch, Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2003-307.html
Scores
EPSS
0.0801
EPSS Percentile
92.2%
Details
CWE
CWE-20
Status
published
Products (11)
gnu/zebra
0.91a
gnu/zebra
0.92a
gnu/zebra
0.93a
gnu/zebra
0.93b
quagga/quagga
0.95
quagga/quagga
0.96
quagga/quagga
0.96.1
quagga/quagga
0.96.2
quagga/quagga
< 0.96.3
sgi/propack
2.2.1
... and 1 more
Published
Dec 15, 2003
Tracked Since
Feb 18, 2026