First published: Thu Aug 10 2023(Updated: )
FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Frrouting Frrouting | >=7.5.1<=9.0 | |
Pica8 PICOS | =4.3.3.2 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
redhat/frr | <9.1 | 9.1 |
redhat/frr | <8.4 | 8.4 |
debian/frr | 7.5.1-1.1+deb11u2 7.5.1-1.1+deb11u3 8.4.4-1.1~deb12u1 10.1.1-0.1 10.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38802 is a vulnerability in FRRouting and Pica8 PICOS that allows a remote attacker to cause a denial of service by exploiting a corrupted attribute in a BGP update packet.
CVE-2023-38802 affects FRRouting versions 7.5.1 through 9.0 and can lead to a denial of service attack.
CVE-2023-38802 affects Pica8 PICOS version 4.3.3.2 and can lead to a denial of service attack.
To fix CVE-2023-38802 in FRRouting, update to a version that is not affected, such as 9.0 or a later version, once it becomes available.
To fix CVE-2023-38802 in Pica8 PICOS, update to version 4.3.3.3 or a later version, once it becomes available.