An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing | Exploit Third Party Advisory |
https://github.com/FRRouting/frr/issues/11698 | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-08-02 16:15
Updated : 2022-08-10 10:07
NVD link : CVE-2022-37035
Mitre link : CVE-2022-37035
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
frrouting
- frrouting