CVE-2023-3748
- EPSS 0.02%
- Veröffentlicht 24.07.2023 16:15:13
- Zuletzt bearbeitet 21.11.2024 08:17:58
A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any...
CVE-2023-31490
- EPSS 4.49%
- Veröffentlicht 09.05.2023 16:15:14
- Zuletzt bearbeitet 21.11.2024 08:01:58
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.
CVE-2023-31489
- EPSS 0.25%
- Veröffentlicht 09.05.2023 16:15:14
- Zuletzt bearbeitet 21.11.2024 08:01:58
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.
CVE-2022-43681
- EPSS 0.16%
- Veröffentlicht 03.05.2023 12:16:30
- Zuletzt bearbeitet 21.11.2024 07:27:01
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out ...
CVE-2022-40318
- EPSS 0.12%
- Veröffentlicht 03.05.2023 12:16:27
- Zuletzt bearbeitet 21.11.2024 07:21:18
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bound...
CVE-2022-40302
- EPSS 0.16%
- Veröffentlicht 03.05.2023 12:16:27
- Zuletzt bearbeitet 30.01.2025 17:15:11
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bound...
CVE-2022-36440
- EPSS 0.24%
- Veröffentlicht 03.04.2023 16:15:07
- Zuletzt bearbeitet 21.11.2024 07:13:00
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.
CVE-2022-37032
- EPSS 0.61%
- Veröffentlicht 19.09.2022 22:15:11
- Zuletzt bearbeitet 21.11.2024 07:14:19
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
CVE-2022-37035
- EPSS 2.95%
- Veröffentlicht 02.08.2022 23:15:18
- Zuletzt bearbeitet 21.11.2024 07:14:19
An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Discl...
CVE-2022-26129
- EPSS 0.11%
- Veröffentlicht 03.03.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:53:29
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.