S-284: Border Gateway Protocol Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-284: Border Gateway Protocol Vulnerabilities
# 1  
Old 05-07-2008
S-284: Border Gateway Protocol Vulnerabilities

Boorder Gateway Protocol (BGP) implementations from multiple vendors including Juniper may not properly handle specially crafted BGP UPDATE messages. These vulnerabilities could allow an unauthenticated, remote attacker to cause a denial of service. Disrupting BGP communication could lead to routing instability. The risk is LOW. A remote attacker could cause a denial of servcie by injecting a specially crafted BGP UPDATE message into a legitimate BGP session. An attacker with a configured BGP session could attack targets several BGP hops away, or an attacker could spoof TCP traffic.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Inconsistency between RedHat 6.5 global gateway and single gateway leads to loss of default gateway

Dear friends I use RedHat 6.5, which sets the gateway in the configuration file / etc / sysconfig / network as GATEWAY = 192.168.1.26, and the gateway in the configuration file / etc / sysconfig / network-scripts / ifcfg-eth11 as GATEWAY = 192.168.1.256. The two gateways are different.... (6 Replies)
Discussion started by: tanpeng
6 Replies

2. IP Networking

Regarding Protocol certiifcation

Hello Forum Members, I am siva ranganath from Hyderabad-India. I have an work experince of 4.5 years as application developer and support member in open source systems.i am good basic network programing ie applications developing in TCP/IP and i have an experince of 1 year in this N/W... (0 Replies)
Discussion started by: workforsiva
0 Replies

3. Linux

GNUGK-How to setup static gateway to gateway routing

Dear Sir I am a newbie in the world of IP telephony. I have been working with Asterisk PBX (SIP) and Cisco Call Manager (MGCP) but now I am learning on how to work GNUGK for H.323 Gatekeeper. I am having a problem, configuring static call routing on GNUGK in the section ... (0 Replies)
Discussion started by: mfondoum
0 Replies

4. Infrastructure Monitoring

SNMP protocol

dear friends , how can I use the SNMP protocol to monitor the network and send notification alerts to the clients which have windows machines. I found the utility snmp_trapsend at the directory /usr/sbin ,how can I use this command ?? my server is SUN SOLARIS. please help !!!:confused: (1 Reply)
Discussion started by: Ahmed waheed
1 Replies

5. IP Networking

protocol

iam doing a research on WAN so pliz any body can give me or tell me where i would find communication protocol map..thats all 7 layers..OIS MODEL (1 Reply)
Discussion started by: ravineelkumar
1 Replies

6. IP Networking

Protocol Numbers

I'm planning on putting together a chart of basic information (port number, protocol number, transport layer protocol, etc) on different protocols (FTP, ICMP, DNS, IP, etc) I found: http://www.phys-iasi.ro/Library/RFCs/rfc1700.htm and that tells me a little bit of information but I'm looking... (3 Replies)
Discussion started by: thmnetwork
3 Replies
Login or Register to Ask a Question
gated(1M)																 gated(1M)

NAME
gated - gateway routing daemon SYNOPSIS
buffer_size] trace_options] config_file] [trace_file] DESCRIPTION
is a routing daemon that handles multiple routing protocols and replaces routed, egpup, and any routing daemon that speaks the HELLO rout- ing protocol. currently handles the RIP, BGP, EGP, HELLO, and OSPF routing protocols. The process can be configured to perform all rout- ing protocols or any subset of them (see below). Options The command-line options are: Specifies a buffer size for the socket read/write buffer. The buffer size should not be less than one MB (megabyte) and should not exceed the available system memory. If this option is not specified, the buffer size will be set to the available system memory. Specifies that the configuration file will be parsed for syntax errors and then will exit. will leave a dump file in if there were no errors. does not need to be run as the superuser to use the option but it may not be possible to read the kernel forwarding table and interface configuration if not run as superuser. The option implies All trace_option clauses in the configuration file will be ignored. Specifies that the configuration file will just be parsed for syntax errors. will exit with a status 1 if there were any errors and 0 (zero) if there were not. does not need to be run as the supe- ruser to use the option but it may not be possible to read the kernel forwarding table and interface configuration if not run as the superuser. Specifies that will not modify the kernel forwarding table. This is used for testing configurations with actual routing data. Specifies that will not daemonize. Normally, if tracing to stderr is not specified will daemonize if the parent process ID is not that of the ini- tialization process (aka This allows the use of an method of invoking that does not have a PID of the initialization process. Specifies that will add routes to the kernel in the decreasing order of IP addresses of gateways when there are multiple routes to a destination. Specifies a comma separated list of trace options to be enabled on startup. If no flags are specified, is assumed. No space is allowed between this option and it's arguments. This option must be used to trace events that take place before the configuration file is parsed, such as determining the interface configuration and reading routes from the kernel. See the for valid trace options and a more detailed explanation of tracing. Use an alternate config file. By default, uses trace_file Trace file in which to place trace information. If a trace file is specified on the command line, or no trace flags are specified on the command line, detaches from the terminal and runs in the background. If trace flags are specified without specifying a trace file, assumes that tracing is desired to stderr and remains in the foreground. Signal Processing The following signals may be used to control Re-read configuration. A causes to reread the configuration file. first performs a clean-up of all allocated policy structures. All BGP and EGP peers are flagged for deletion and the configuration file is re-parsed. If the re-parse is successful, any BGP and EGP peers that are no longer in the configuration are shut down, and new peers are started. attempts to determine if changes to existing peers require a shutdown and restart. OSPF is not capable of reconfiguring; it is shutdown and restarted during a reconfiguration. This may have an adverse impact on the routing system. It should also be possible to enable/disable any protocol without restarting Snap-shot of current state. The current state of all tasks, timers, protocols and tables are written to On systems supporting this is done by forking a subprocess to dump the table information so as not to impact routing functions. On systems where memory management does not support copy-on-write, this will cause the address space to be duplicated; this may cause a noticeable impact on the system. On system not supporting the main process immediately processes the dump, which may impact routing functions. Graceful shutdown. On receipt of a attempts a graceful shutdown. All tasks and protocols are asked to shutdown. Most will terminate imme- diately, the exception being EGP peers which wait for confirmation. It may be necessary to repeat the once or twice if it this process takes too long. All protocol routes are removed from the kernel's routing table on receipt of a Interface routes, routes with RTF_STATIC set (from the route command where supported) and static routes specifying will remain. To terminate with the exterior routes intact, use Toggle tracing. On receipt of a will close the trace file. A subsequent will cause it to be reopened. This will allow the file to be moved regularly. It is not possible to use if a trace file has not been specified, or tracing is being performed to stderr. Check for interface changes. On receipt of a will rescan the kernel interface list looking for changes. WARNINGS
contains provisions for BGP protocol, but it is not officially supported by HP at the present time. Some RIP version 2 features (RFC1388) are not currently supported: MIB and route tag. The optional OSPF version 2 (RFC1247) feature of TOS (type of service) based routing is not supported. The route aggregation, generating a more general route from compressing the specific routes through the explicit configu- ration, is not supported in this release. AUTHOR
was primarily developed by Cornell University which includes code from the Regents of the University of California and the University of Maryland. This software and associated documentation is Copyright 1990, 1991, 1992 by Cornell University. SEE ALSO
gated.conf(4), arp(1M), fork(2), gdc(1M), ifconfig(1M), netstat(1), ospf_monitor(1M), ripquery(1M), RFC 891 DCN Local-Network Protocols (HELLO) RFC 904 Exterior Gateway Protocol Formal Specification RFC 1058 Routing Information Protocol RFC 1163 A Border Gateway Protocol (BGP) RFC 1164 Application of the Border Gateway Protocol in the Internet RFC 1247 OSPF Specification, Version 2. gated(1M)