Quagga is vulnerable to Denial Of Service (DoS).NULL pointer dereference flaws were found in the way the Quagga bgpd daemon processed certain specially-crafted BGP messages. A configured BGP peer could crash bgpd on a target system via specially-crafted BGP messages.
fedoranews.org/updates/FEDORA-2007-219.shtml
lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html
quagga.net/news2.php?y=2007&m=9&d=7#id1189190760
secunia.com/advisories/26744
secunia.com/advisories/26829
secunia.com/advisories/26863
secunia.com/advisories/27049
secunia.com/advisories/29743
sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1
www.debian.org/security/2007/dsa-1382
www.mandriva.com/security/advisories?name=MDKSA-2007:182
www.quagga.net/download/quagga-0.99.9.changelog.txt
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2010-0785.html
www.securityfocus.com/bid/25634
www.trustix.org/errata/2007/0028/
www.ubuntu.com/usn/usn-512-1
www.vupen.com/english/advisories/2007/3129
www.vupen.com/english/advisories/2008/1195/references
access.redhat.com/errata/RHSA-2010:0785
exchange.xforce.ibmcloud.com/vulnerabilities/36551