Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-61099

Опубликовано: 27 окт. 2025
Источник: redhat
CVSS3: 5.9

Описание

FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.

A NULL pointer dereference vulnerability was found in FRRouting within the show_opaque_info_detail function within ospf_opaque.c. When the OSPF daemon (ospfd) is configured with the debug command debug ospf packet all send/recv detail, it attempts to display detailed information of all received or sent OSPF packets through the VTY interface or zlog. Due to a missing check for functab->show_opaque_info, a NULL pointer dereference can occur when processing a crafted LS Update packet.

Отчет

Exploitation of this issue requires specific conditions, as it is only triggered when OSPF debug mode is manually enabled using the debug ospf packet all send/recv detail command, which is disabled by default. Related commands such as debug ospf packet ls-update send/recv detail merely enable verbose logging for diagnostic purposes and do not alter the normal packet handling or parsing behavior of the OSPF daemon. This issue is rated Moderate rather than Important because it depends on a very specific and non-default runtime condition for exploitation. The vulnerable code path is only reachable when OSPF detailed packet debugging (debug ospf packet all send/recv detail) is explicitly enabled, which is typically used for temporary diagnostic purposes and not in production environments. In normal operation, the affected function is not invoked, thereby significantly reducing exposure. Furthermore, the flaw leads solely to a NULL pointer dereference, causing a crash of the ospfd process without memory corruption or control-flow hijacking potential.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10frrFix deferred
Red Hat Enterprise Linux 8frrFix deferred
Red Hat Enterprise Linux 9frrFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2406601FRRouting: frr: NULL Pointer Dereference in FRRouting

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
5 месяцев назад

FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.

CVSS3: 7.5
nvd
5 месяцев назад

FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.

CVSS3: 7.5
msrc
5 месяцев назад

FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.

CVSS3: 7.5
debian
5 месяцев назад

FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NU ...

CVSS3: 7.5
github
5 месяцев назад

FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.

5.9 Medium

CVSS3