CVE-2022-23088
15.02.2024, 05:15
The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Vendor | Product | Version |
---|---|---|
freebsd | freebsd | 𝑥 < 12.3 |
freebsd | freebsd | 12.4 ≤ 𝑥 < 13.0 |
freebsd | freebsd | 12.3:p1 |
freebsd | freebsd | 12.3:p2 |
freebsd | freebsd | 12.3:p3 |
freebsd | freebsd | 12.3:p4 |
freebsd | freebsd | 13.0:beta1 |
freebsd | freebsd | 13.0:beta2 |
freebsd | freebsd | 13.0:beta3 |
freebsd | freebsd | 13.0:beta3-p1 |
freebsd | freebsd | 13.0:beta4 |
freebsd | freebsd | 13.0:p1 |
freebsd | freebsd | 13.0:p10 |
freebsd | freebsd | 13.0:p2 |
freebsd | freebsd | 13.0:p3 |
freebsd | freebsd | 13.0:p4 |
freebsd | freebsd | 13.0:p5 |
freebsd | freebsd | 13.0:p6 |
freebsd | freebsd | 13.0:p7 |
freebsd | freebsd | 13.0:p8 |
freebsd | freebsd | 13.0:p9 |
freebsd | freebsd | 13.0:rc1 |
freebsd | freebsd | 13.0:rc2 |
freebsd | freebsd | 13.0:rc3 |
freebsd | freebsd | 13.0:rc4 |
freebsd | freebsd | 13.0:rc5 |
freebsd | freebsd | 13.0:rc5-p1 |
freebsd | freebsd | 13.1:b1-p1 |
freebsd | freebsd | 13.1:b2-p2 |
𝑥
= Vulnerable software versions