First published: Tue Jul 18 2023(Updated: )
A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/frr | <8.5 | 8.5 |
ubuntu/frr | <8.4.2-1ubuntu1.2 | 8.4.2-1ubuntu1.2 |
Frrouting Frrouting | <8.5 | |
<8.5 | ||
debian/frr | <=8.4.4-1.1~deb12u1<=8.4.4-1.1 | 6.0.2-2+deb10u1 7.5.1-1.1+deb10u1 7.5.1-1.1+deb11u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-3748.
The severity of CVE-2023-3748 is high, with a severity value of 7.5.
The affected software versions are FRRouting 8.4.2-1ubuntu1.2, FRRouting 8.5, and Frrouting Frrouting up to version 8.5.
The remedy for CVE-2023-3748 in Ubuntu is to update to version 8.4.2-1ubuntu1.2 of the FRRouting package.
The remedy for CVE-2023-3748 in Red Hat is to update to version 8.5 of the FRRouting package.