Ping Processing Bug in FreeBSD Can Cause Crashes
CVE-2022-23093
Key Information:
Badges
What is CVE-2022-23093?
This vulnerability pertains to a buffer overflow issue in the FreeBSD ping utility, specifically within the pr_pack() function, which handles raw IP packets. When the ping utility processes packets that contain IP option headers, it fails to properly account for their size. This oversight can result in the overflow of stack buffers by as much as 40 bytes, compromising memory safety. Remote attackers can exploit this flaw, potentially leading to crashes of the ping program. Although the ping utility operates within a capability mode sandbox on affected FreeBSD versions, limiting its interaction with the system, the vulnerability still poses a notable risk.
Affected Version(s)
FreeBSD 13.1-RELEASE
FreeBSD 12.4-RC2
FreeBSD 12.3-RELEASE
References
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved