3.7 LOW
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
osrg GoBGP BGP OPEN Message bgp.go DecodeFromBytes access control
A security flaw has been discovered in osrg GoBGP up to 4.3.0. This affects the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the component BGP OPEN Message Handler. Performing a manipulation of the argument domainNameLen results in improper access controls. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The patch is named 2b09db390a3d455808363c53e409afe6b1b86d2d. It is suggested to install a patch to address this issue.
References
-
VDB-354154 | osrg GoBGP BGP OPEN Message bgp.go DecodeFromBytes access control vdb-entrytechnical-description
-
-
Submit #780124 | GoBGP 4.3.0 Improper Handling of Length Parameter Inconsistency third-party-advisory
-
-
https://github.com/osrg/gobgp/ product
Affected products
- ==4.1
- ==4.0
- ==4.3.0
- ==4.2
Matching in nixpkgs
pkgs.gobgp
CLI tool for GoBGP
Package maintainers
-
@higebu Yuya Kusakabe <yuya.kusakabe@gmail.com>