CVE-2022-40302

An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
frroutingfrrouting
𝑥
≤ 8.4
debiandebian_linux
10.0
debiandebian_linux
11.0
debiandebian_linux
12.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
frr
bullseye
7.5.1-1.1+deb11u2
fixed
bullseye (security)
7.5.1-1.1+deb11u3
fixed
bookworm
8.4.4-1.1~deb12u1
fixed
bookworm (security)
8.4.4-1.1~deb12u1
fixed
sid
10.1.1-0.1
fixed
trixie
10.1.1-0.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
frr
lunar
not-affected
kinetic
not-affected
jammy
not-affected
focal
not-affected
bionic
dne
xenial
ignored
trusty
ignored