Vulnerability Details : CVE-2022-37035
Potential exploit
An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.
Vulnerability category: Memory CorruptionExecute codeInformation leak
Products affected by CVE-2022-37035
- cpe:2.3:a:frrouting:frrouting:8.3:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-37035
2.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-37035
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2022-37035
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-37035
-
https://github.com/FRRouting/frr/issues/11698
bgpd: A use-after-free bug due to race conditions in 2 threads. · Issue #11698 · FRRouting/frr · GitHubExploit;Third Party Advisory
-
https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing
poc for uaf - Google DocsExploit;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html
[SECURITY] [DLA 3797-1] frr security update
Jump to