Описание
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.
A vulnerability was found in FRRouting stemming from a boundary error in bgpd/bgp_open.c. The issue arises because it fails to check for an excessively large length of the received software version (rcv). This flaw allows a remote attacker to overflow a buffer by sending specially crafted data to the application, leading to a denial of service condition.
Отчет
In Red Hat Enterprise Linux 8 and 9, the vulnerable code is not included. It was added much later during the development of the 9.x version of FRR in upstream. The highest version of FRR utilized in RHEL is 8.5. Consequently, none of the FRR versions shipped in RHEL are affected by this vulnerability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | frr | Not affected | ||
Red Hat Enterprise Linux 9 | frr | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not ...
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.
EPSS
5.9 Medium
CVSS3