CVE-2022-40318

Source
https://cve.org/CVERecord?id=CVE-2022-40318
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40318.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-40318
Downstream
Related
Published
2023-05-03T12:16:27.800Z
Modified
2026-01-31T10:54:52.912962Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgpopenoptionparse in the bgpopen.c file, a different location (with a different attack vector) relative to CVE-2022-40302.

References

Affected packages

Git / github.com/frrouting/frr

Affected ranges

Type
GIT
Repo
https://github.com/frrouting/frr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

7.*
7.1_pulled
8.*
8.1-dev
base_7.*
base_7.2
base_7.3
base_7.4
base_7.5
base_7.6
base_8.*
base_8.0
base_8.1
base_8.2
base_8.3
frr-2.*
frr-2.0
frr-2.0-rc1
frr-2.0-rc2
frr-3.*
frr-3.0-branchpoint
frr-3.0-rc0
frr-3.0-rc1
frr-3.1-dev
frr-5.*
frr-5.1-dev
frr-6.*
frr-6.1-dev
frr-7.*
frr-7.1-dev
frr-7.2-dev
frr-7.3-dev
frr-7.4-dev
frr-7.5-dev
frr-7.6-dev
frr-8.*
frr-8.0-dev
frr-8.1-dev
frr-8.1-rc1
frr-8.2-dev
frr-8.3-dev
frr-8.4-dev
reindent-3.*
reindent-3.0-after
reindent-3.0-before
Other
reindent-master-after
reindent-master-before

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40318.json"