Nic Bird 2.0.0

CPE Details

Nic Bird 2.0.0
2.0.0
2019-09-10
14h48 +00:00
2019-09-10
14h48 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:nic:bird:2.0.0:*:*:*:*:*:*:*

Informations

Vendor

nic

Product

bird

Version

2.0.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-26928 2021-06-04 18h13 +00:00 BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees
6.8
Moyen
CVE-2019-16159 2019-09-09 12h34 +00:00 BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon's support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
7.5
Haute