Bug 2235844 (CVE-2023-41361) - CVE-2023-41361 frr: does not check for an overly large length of the rcv software version
Summary: CVE-2023-41361 frr: does not check for an overly large length of the rcv soft...
Keywords:
Status: ASSIGNED
Alias: CVE-2023-41361
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2236315 2236316 2236469 2236476 2236477
Blocks: 2230985
TreeView+ depends on / blocked
 
Reported: 2023-08-29 20:54 UTC by Anten Skrabec
Modified: 2024-01-29 06:21 UTC (History)
2 users (show)

Fixed In Version: frr 9.1-rc, frr 9.0-rc
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in FRRouting stemming from a boundary error in bgpd/bgp_open.c. The issue arises because it fails to check for an excessively large length of the received software version (rcv). This flaw allows a remote attacker to overflow a buffer by sending specially crafted data to the application, leading to a denial of service condition.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Anten Skrabec 2023-08-29 20:54:22 UTC
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.

https://github.com/FRRouting/frr/pull/14241

Comment 3 msiddiqu 2023-08-31 10:50:27 UTC
Created frr tracking bugs for this issue:

Affects: fedora-all [bug 2236469]


Note You need to log in before you can comment on or make changes to this bug.