First published: Tue Aug 29 2023(Updated: )
In OpenBGPD before 8.1, incorrect handling of BGP update data (length of path attributes) set by a potentially distant remote actor may cause the system to incorrectly reset a session. This is fixed in OpenBSD 7.3 errata 006.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbgpd Openbgpd | <8.1 | |
Openbsd Openbsd | <7.3 | |
Openbsd Openbsd | =7.3 | |
Openbsd Openbsd | =7.3-errata_001 | |
Openbsd Openbsd | =7.3-errata_002 | |
Openbsd Openbsd | =7.3-errata_003 | |
Openbsd Openbsd | =7.3-errata_004 | |
Openbsd Openbsd | =7.3-errata_005 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenBGPD vulnerability is CVE-2023-38283.
The severity of CVE-2023-38283 is medium with a severity value of 5.3.
This vulnerability in OpenBGPD could potentially cause the system to incorrectly reset a session.
No, OpenBGPD vulnerability does not affect OpenBSD 7.3.
To fix CVE-2023-38283 in OpenBGPD, you should update to OpenBGPD version 8.1 or apply the OpenBSD 7.3 errata 006 patch.