An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "11.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "12.0"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": [
"cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "8.4"
},
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD"
}