CVE-2023-46753
Published: 26 October 2023
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
Notes
| Author | Note |
|---|---|
| sbeattie | the quagga project was renamed to frr |
Priority
Status
| Package | Release | Status |
|---|---|---|
|
frr Launchpad, Ubuntu, Debian |
bionic |
Ignored
(end of standard support)
|
| focal |
Released
(7.2.1-1ubuntu0.2+esm2)
Available with Ubuntu Pro |
|
| jammy |
Released
(8.1-1ubuntu1.7)
|
|
| lunar |
Released
(8.4.2-1ubuntu1.5)
|
|
| mantic |
Released
(8.4.4-1.1ubuntu1.1)
|
|
| noble |
Released
(8.4.4-1.1ubuntu2)
|
|
| trusty |
Ignored
(end of standard support)
|
|
| upstream |
Needs triage
|
|
| xenial |
Ignored
(end of standard support)
|
|
|
Patches: upstream: https://github.com/FRRouting/frr/commit/d8482bf011cb2b173e85b65b4bf3d5061250cdb9 upstream: https://github.com/FRRouting/frr/commit/21418d64af11553c402f932b0311c812d98ac3e4 |
||
|
quagga Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
| focal |
Released
(1.2.4-4ubuntu0.4)
|
|
| jammy |
Does not exist
|
|
| lunar |
Does not exist
|
|
| mantic |
Does not exist
|
|
| noble |
Does not exist
|
|
| trusty |
Ignored
(end of standard support)
|
|
| upstream |
Needs triage
|
|
| xenial |
Needs triage
|
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.9 |
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |