Untriaged
Permalink
CVE-2023-3748
3.5 LOW
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): LOW
Inifinite loop in babld message parsing may cause dos
A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service.
References
- https://access.redhat.com/security/cve/CVE-2023-3748 x_refsource_REDHAT vdb-entry
- RHBZ#2223668 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-3748 x_refsource_REDHAT vdb-entry
- RHBZ#2223668 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-3748 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2223668 issue-tracking x_refsource_REDHAT x_transferred
- https://access.redhat.com/security/cve/CVE-2023-3748 x_refsource_REDHAT vdb-entry
- RHBZ#2223668 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-3748 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2223668 issue-tracking x_refsource_REDHAT x_transferred
Affected products
frr
- ==8.5
Matching in nixpkgs
pkgs.prometheus-frr-exporter
Prometheus exporter for FRR version 3.0+
-
nixos-unstable -
- nixpkgs-unstable 1.8.1
Package maintainers
-
@woffs Frank Doepper <github@woffs.de>
-
@thillux Markus Theil <theil.markus@gmail.com>
-
@javaes Jan van Esdonk <jan+dev@vanesdonk.de>