A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.
References
Link | Resource |
---|---|
https://github.com/spwpun/pocs/blob/main/frr-bgpd.md | Exploit Third Party Advisory |
https://github.com/spwpun/pocs | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5495 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GM66PNHGCXZU66LQCTP2FSJLFF6CVMSI/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
01 Feb 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GM66PNHGCXZU66LQCTP2FSJLFF6CVMSI/ - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/ - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5495 - Third Party Advisory | |
First Time |
Fedoraproject fedora
Fedoraproject Debian Debian debian Linux |
07 Nov 2023, 03:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
21 Apr 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Apr 2023, 06:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://github.com/spwpun/pocs/blob/main/frr-bgpd.md - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/spwpun/pocs - Third Party Advisory | |
CWE | CWE-617 | |
CPE | cpe:2.3:a:frrouting:frrouting:8.3:-:*:*:*:*:*:* | |
First Time |
Frrouting frrouting
Frrouting |
03 Apr 2023, 17:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-03 16:15
Updated : 2024-02-01 01:11
NVD link : CVE-2022-36440
Mitre link : CVE-2022-36440
JSON object : View
Products Affected
debian
- debian_linux
frrouting
- frrouting
fedoraproject
- fedora
CWE
CWE-617
Reachable Assertion