Nic Bird 1.6.1

CPE Details

Nic Bird 1.6.1
1.6.1
2019-09-10
14h48 +00:00
2019-09-10
14h48 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:nic:bird:1.6.1:*:*:*:*:*:*:*

Informations

Vendor

nic

Product

bird

Version

1.6.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-26928 2021-06-04 18h13 +00:00 BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees
6.8
Medium
CVE-2019-16159 2019-09-09 12h34 +00:00 BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
7.5
High