Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-37035

Опубликовано: 02 авг. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.1

Описание

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

РелизСтатусПримечание
bionic

DNE

devel

released

8.1-1ubuntu3
esm-apps/focal

released

7.2.1-1ubuntu0.2+esm2
focal

ignored

end of standard support, was needed
jammy

released

8.1-1ubuntu1.2
kinetic

released

8.1-1ubuntu3
lunar

released

8.1-1ubuntu3
mantic

released

8.1-1ubuntu3
noble

released

8.1-1ubuntu3
oracular

released

8.1-1ubuntu3

Показывать по

EPSS

Процентиль: 86%
0.03024
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 8.1
nvd
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 8.1
debian
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_ ...

CVSS3: 8.1
github
почти 3 года назад

An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.

CVSS3: 4.3
fstec
почти 3 года назад

Уязвимость функций bgp_notify_send_with_data() и bgp_process_packet() (bgp_packet.c) программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.03024
Низкий

8.1 High

CVSS3