First published: Wed May 03 2023(Updated: )
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/frr | <=6.0.2-2+deb10u1 | 7.5.1-1.1+deb10u1 7.5.1-1.1+deb11u2 8.4.4-1.1~deb12u1 8.4.4-1.1 |
Frrouting Frrouting | <=8.4 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43681 is a vulnerability in the BGP daemon of FRRouting FRR through version 8.4, which allows an out-of-bounds read when sending a malformed BGP OPEN message.
CVE-2022-43681 affects FRRouting versions up to and including 8.4, allowing an attacker to trigger an out-of-bounds read by sending a specific type of malformed BGP OPEN message.
The severity of CVE-2022-43681 is rated as medium with a severity value of 6.5.
To fix CVE-2022-43681 in FRRouting, you should update to a version that is not affected by the vulnerability, such as version 8.4.4-1.1~deb12u1 or later.
You can find more information about CVE-2022-43681 on the Forescout and Debian security tracker websites.