NA

CVE-2022-40302

Published: 03/05/2023 Updated: 01/02/2024
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

An issue exists in bgpd in FRRouting (FRR) up to and including 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

frrouting frrouting

debian debian linux 10.0

debian debian linux 11.0

debian debian linux 12.0

Vendor Advisories

Synopsis Moderate: frr security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for frr is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having ...
Debian Bug report logs - #1035829 frr: CVE-2022-43681 CVE-2022-40318 CVE-2022-40302 Package: src:frr; Maintainer for src:frr is David Lamparter <equinox-debian@diac24net>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Tue, 9 May 2023 19:21:02 UTC Severity: grave Tags: security Reply or subscribe to t ...
Multiple vulnerabilities were discovered in frr, the FRRouting suite of internet protocols, while processing malformed requests and packets the BGP daemon may have reachable assertions, NULL pointer dereference, out-of-bounds memory access, which may lead to denial of service attack For the oldstable distribution (bullseye), these problems have be ...
DescriptionThe MITRE CVE dictionary describes this issue as: An issue was discovered in bgpd in FRRouting (FRR) through 84 By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read) This is possible because of in ...

Github Repositories

A simple BGP fuzzer based on BooFuzz The goal of this project was to implement a simple black-box fuzzer for various BGP protocol implementations For the moment, the focus of the fuzzer is malformed packets, but we believe that it can be extended to cover some of the bugs related to the BGP state machine We chose to build upon BooFuzz Usage Before running the tool for the fi