{"id":"CVE-2006-2224","details":"RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.","modified":"2024-06-04T04:00:19Z","published":"2006-05-05T19:02:00Z","withdrawn":"2024-06-30T15:57:04.023607Z","references":[{"type":"ADVISORY","url":"ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"},{"type":"FIX","url":"http://secunia.com/advisories/19910"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20137"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20138"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20221"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20420"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20421"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20782"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21159"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-1059"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_17_sr.html"},{"type":"FIX","url":"http://www.securityfocus.com/bid/17808"},{"type":"FIX","url":"http://bugzilla.quagga.net/show_bug.cgi?id=262"},{"type":"WEB","url":"http://securitytracker.com/id?1016204"},{"type":"WEB","url":"http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml"},{"type":"WEB","url":"http://www.osvdb.org/25225"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2006-0525.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2006-0533.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/432823/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/432856/100/0/threaded"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26251"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775"},{"type":"WEB","url":"https://usn.ubuntu.com/284-1/"}],"affected":[{"package":{"name":"quagga","ecosystem":"Debian:10","purl":"pkg:deb/debian/quagga?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.99.3-2"}]}],"ecosystem_specific":{"urgency":"medium"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-2224.json"}}],"schema_version":"1.7.3"}