Lucene search

K
redhatcveRedhat.comRH:CVE-2017-3224
HistoryJul 28, 2017 - 1:48 a.m.

CVE-2017-3224

2017-07-2801:48:37
redhat.com
access.redhat.com
7

0.001 Low

EPSS

Percentile

33.1%

A vulnerability was discovered in several OSPF implementations, including Quagga. A malicious OSPF peer, or an attacker able to spoof messages from an OSPF peer, could send a crafted message that would result in erasure or alteration of the routing table, resulting in denial of service or incorrect routing of traffic.

Mitigation

It is strongly recommended to configure Quagga to require authentication from OSPF peers (eg ip ospf authentication message-digest ). Message digest authentication effectively prevents even a man-in-the-middle attacker from exploiting this vulnerability or otherwise interfering with the routing table, as any message without a proper cryptographic signature will be rejected.

0.001 Low

EPSS

Percentile

33.1%