An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing | Exploit Third Party Advisory |
https://github.com/FRRouting/frr/issues/11698 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-08-02T00:00:00
Updated: 2024-04-28T07:06:13.134726
Reserved: 2022-07-29T00:00:00
Link: CVE-2022-37035
JSON object: View
NVD Information
Status : Modified
Published: 2022-08-02T23:15:18.230
Modified: 2024-04-28T07:15:08.190
Link: CVE-2022-37035
JSON object: View
Redhat Information
No data.
CWE