CVE-2023-41360
Published: 29 August 2023
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.
Notes
| Author | Note |
|---|---|
Priority reason: Only exposes the initial byte. |
|
| sbeattie | the quagga project was renamed to frr |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
frr Launchpad, Ubuntu, Debian |
bionic |
Ignored
(end of standard support)
|
| focal |
Released
(7.2.1-1ubuntu0.2+esm1)
Available with Ubuntu Pro |
|
| jammy |
Released
(8.1-1ubuntu1.6)
|
|
| lunar |
Released
(8.4.2-1ubuntu1.4)
|
|
| mantic |
Not vulnerable
(8.4.4-1.1ubuntu1)
|
|
| noble |
Not vulnerable
(8.4.4-1.1ubuntu1)
|
|
| trusty |
Ignored
(end of standard support)
|
|
| upstream |
Needs triage
|
|
| xenial |
Ignored
(end of standard support)
|
|
|
Patches: upstream: https://github.com/FRRouting/frr/pull/14245/commits/9b855a692e68e0d16467e190b466b4ecb6853702 |
||
|
quagga Launchpad, Ubuntu, Debian |
bionic |
Released
(1.2.4-1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
| focal |
Released
(1.2.4-4ubuntu0.1)
|
|
| jammy |
Does not exist
|
|
| lunar |
Does not exist
|
|
| mantic |
Does not exist
|
|
| noble |
Does not exist
|
|
| trusty |
Ignored
(end of standard support)
|
|
| upstream |
Needs triage
|
|
| xenial |
Released
(0.99.24.1-2ubuntu1.4+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 9.1 |
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |