Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-37035

Опубликовано: 02 авг. 2022
Источник: debian
EPSS Низкий

Описание

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
frrfixed8.4.1-1package

Примечания

  • https://github.com/FRRouting/frr/issues/11698

  • https://github.com/FRRouting/frr/pull/11926

  • https://github.com/FRRouting/frr/commit/71ca5b09bc71e8cbe38177cf41e83fe164e52eee

EPSS

Процентиль: 86%
0.03024
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 8.1
redhat
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 8.1
nvd
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 8.1
github
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 4.3
fstec
почти 3 года назад

Уязвимость функций bgp_notify_send_with_data() и bgp_process_packet() (bgp_packet.c) программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.03024
Низкий