First published: Mon Aug 19 2024(Updated: )
An issue was discovered in FRRouting (FRR) through 10.1. bgp_attr_encap in bgpd/bgp_attr.c does not check the actual remaining stream length before taking the TLV value.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Frrouting bgpd | <=10.1 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
debian/frr | <=7.5.1-1.1+deb11u2<=8.4.4-1.1~deb12u1 | 7.5.1-1.1+deb11u4 10.2.1-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44070 is classified as a medium severity vulnerability due to improper length checks in FRRouting.
To remediate CVE-2024-44070, update FRRouting to version 10.2.1-2 or later.
CVE-2024-44070 affects FRRouting versions up to 10.1 and specific versions of Red Hat Enterprise Linux 8.0 and 9.0.
Yes, CVE-2024-44070 may be exploitable remotely depending on the network configuration.
CVE-2024-44070 impacts the FRRouting application, specifically its bgpd component.