PT-2022-6597 · Unknown +3 · Frrouting Frr +3

Published

2022-10-24

·

Updated

2024-04-03

·

CVE-2022-43681

CVSS v2.0
7.8
VectorAV:N/AC:L/Au:N/C:N/I:N/A:C

Name of the Vulnerable Software and Affected Versions:

FRRouting FRR versions through 8.4

Description:

An out-of-bounds read exists in the BGP daemon of FRRouting FRR. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition. The issue can be exploited by a remote attacker to cause a denial of service.

Recommendations:

For FRRouting FRR versions through 8.4, consider disabling the BGP daemon until a patch is available to prevent exploitation. Restrict access to the BGP daemon to minimize the risk of exploitation. Avoid sending malformed BGP OPEN messages to the affected system until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

DoS

Out of bounds Read

Weakness Enumeration

Related Identifiers

ALSA-2023:6434
BDU:2023-02673
CVE-2022-43681
DLA-3573-1
DSA-5495-1
RHSA-2023:6434
RHSA-2023_6434

Affected Products

Almalinux
Frrouting Frr
Red Hat
Red Os