Show plain JSON{"id": "CVE-2006-2224", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-05-05T19:02:00.000", "references": [{"url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc", "source": "cve@mitre.org"}, {"url": "http://bugzilla.quagga.net/show_bug.cgi?id=262", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/19910", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20137", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20138", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20221", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20420", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20421", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/20782", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/21159", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1016204", "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2006/dsa-1059", "source": "cve@mitre.org"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/25225", "source": "cve@mitre.org"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0525.html", "source": "cve@mitre.org"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0533.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/432823/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/432856/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/17808", "tags": ["Exploit", "Patch"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26251", "source": "cve@mitre.org"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775", "source": "cve@mitre.org"}, {"url": "https://usn.ubuntu.com/284-1/", "source": "cve@mitre.org"}, {"url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://bugzilla.quagga.net/show_bug.cgi?id=262", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/19910", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20137", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20138", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20221", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20420", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20421", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/20782", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/21159", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1016204", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2006/dsa-1059", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.gentoo.org/security/en/glsa/glsa-200605-15.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/25225", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0525.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redhat.com/support/errata/RHSA-2006-0533.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/432823/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/432856/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/17808", "tags": ["Exploit", "Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26251", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10775", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/284-1/", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-287"}]}], "descriptions": [{"lang": "en", "value": "RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets."}, {"lang": "es", "value": "RIPd en Quagga 0.98 y 0.99 anteriores a 20060503 no imponen adecuadamente los requerimientos de autenticaci\u00f3n de de RIPv2, lo que permite a atacantes remotos modificar el estado de encaminamiento mediante paquetes RIPv1 \"RESPONSE\".\r\n"}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:quagga:quagga_routing_software_suite:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26EE7E06-CE27-4782-9A53-35993AC53CB2", "versionEndIncluding": "0.99.3"}, {"criteria": "cpe:2.3:a:quagga:quagga_routing_software_suite:0.95:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18918EDF-53FF-4841-9386-5ED3F168B3B4"}, {"criteria": "cpe:2.3:a:quagga:quagga_routing_software_suite:0.96.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "435E018F-DDB1-4909-B808-A45315AFECE8"}, {"criteria": "cpe:2.3:a:quagga:quagga_routing_software_suite:0.96.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA29EC39-0599-442C-A9E4-1956C6C7AC4A"}, {"criteria": "cpe:2.3:a:quagga:quagga_routing_software_suite:0.98.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08BBAC60-F40D-4ED1-9CAD-13C0184F05A3"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}