Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2023-3748 CVE-2023-38802 CVE-2023-41358 CVE-2023-41360 CVE-2023-41909 |
CWE-ID | CWE-835 CWE-20 CWE-125 CWE-476 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Server Applications Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system libfrr0-debuginfo Operating systems & Components / Operating system package or component libfrrcares0 Operating systems & Components / Operating system package or component frr-debugsource Operating systems & Components / Operating system package or component libfrrfpm_pb0-debuginfo Operating systems & Components / Operating system package or component libfrrsnmp0 Operating systems & Components / Operating system package or component frr Operating systems & Components / Operating system package or component frr-debuginfo Operating systems & Components / Operating system package or component libfrrospfapiclient0-debuginfo Operating systems & Components / Operating system package or component libfrrfpm_pb0 Operating systems & Components / Operating system package or component libfrrospfapiclient0 Operating systems & Components / Operating system package or component libmlag_pb0-debuginfo Operating systems & Components / Operating system package or component libmlag_pb0 Operating systems & Components / Operating system package or component libfrrsnmp0-debuginfo Operating systems & Components / Operating system package or component libfrrcares0-debuginfo Operating systems & Components / Operating system package or component libfrrzmq0-debuginfo Operating systems & Components / Operating system package or component libfrr_pb0-debuginfo Operating systems & Components / Operating system package or component libfrr0 Operating systems & Components / Operating system package or component frr-devel Operating systems & Components / Operating system package or component libfrr_pb0 Operating systems & Components / Operating system package or component libfrrzmq0 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU78619
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-3748
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing hello messages. A remote attacker can send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to consume all available system resources and cause denial of service conditions.
MitigationUpdate the affected package frr to the latest version.
Vulnerable software versionsServer Applications Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
libfrr0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0: before 8.4-150500.4.8.1
frr-debugsource: before 8.4-150500.4.8.1
libfrrfpm_pb0-debuginfo: before 8.4-150500.4.8.1
libfrrsnmp0: before 8.4-150500.4.8.1
frr: before 8.4-150500.4.8.1
frr-debuginfo: before 8.4-150500.4.8.1
libfrrospfapiclient0-debuginfo: before 8.4-150500.4.8.1
libfrrfpm_pb0: before 8.4-150500.4.8.1
libfrrospfapiclient0: before 8.4-150500.4.8.1
libmlag_pb0-debuginfo: before 8.4-150500.4.8.1
libmlag_pb0: before 8.4-150500.4.8.1
libfrrsnmp0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0-debuginfo: before 8.4-150500.4.8.1
libfrrzmq0-debuginfo: before 8.4-150500.4.8.1
libfrr_pb0-debuginfo: before 8.4-150500.4.8.1
libfrr0: before 8.4-150500.4.8.1
frr-devel: before 8.4-150500.4.8.1
libfrr_pb0: before 8.4-150500.4.8.1
libfrrzmq0: before 8.4-150500.4.8.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20233709-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80766
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-38802
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing BGP update data with a corrupted attribute 23 (Tunnel Encapsulation). A remote attacker can send specially crafted BGP update data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package frr to the latest version.
Vulnerable software versionsServer Applications Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
libfrr0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0: before 8.4-150500.4.8.1
frr-debugsource: before 8.4-150500.4.8.1
libfrrfpm_pb0-debuginfo: before 8.4-150500.4.8.1
libfrrsnmp0: before 8.4-150500.4.8.1
frr: before 8.4-150500.4.8.1
frr-debuginfo: before 8.4-150500.4.8.1
libfrrospfapiclient0-debuginfo: before 8.4-150500.4.8.1
libfrrfpm_pb0: before 8.4-150500.4.8.1
libfrrospfapiclient0: before 8.4-150500.4.8.1
libmlag_pb0-debuginfo: before 8.4-150500.4.8.1
libmlag_pb0: before 8.4-150500.4.8.1
libfrrsnmp0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0-debuginfo: before 8.4-150500.4.8.1
libfrrzmq0-debuginfo: before 8.4-150500.4.8.1
libfrr_pb0-debuginfo: before 8.4-150500.4.8.1
libfrr0: before 8.4-150500.4.8.1
frr-devel: before 8.4-150500.4.8.1
libfrr_pb0: before 8.4-150500.4.8.1
libfrrzmq0: before 8.4-150500.4.8.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20233709-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81444
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-41358
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package frr to the latest version.
Vulnerable software versionsServer Applications Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
libfrr0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0: before 8.4-150500.4.8.1
frr-debugsource: before 8.4-150500.4.8.1
libfrrfpm_pb0-debuginfo: before 8.4-150500.4.8.1
libfrrsnmp0: before 8.4-150500.4.8.1
frr: before 8.4-150500.4.8.1
frr-debuginfo: before 8.4-150500.4.8.1
libfrrospfapiclient0-debuginfo: before 8.4-150500.4.8.1
libfrrfpm_pb0: before 8.4-150500.4.8.1
libfrrospfapiclient0: before 8.4-150500.4.8.1
libmlag_pb0-debuginfo: before 8.4-150500.4.8.1
libmlag_pb0: before 8.4-150500.4.8.1
libfrrsnmp0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0-debuginfo: before 8.4-150500.4.8.1
libfrrzmq0-debuginfo: before 8.4-150500.4.8.1
libfrr_pb0-debuginfo: before 8.4-150500.4.8.1
libfrr0: before 8.4-150500.4.8.1
frr-devel: before 8.4-150500.4.8.1
libfrr_pb0: before 8.4-150500.4.8.1
libfrrzmq0: before 8.4-150500.4.8.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20233709-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81446
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-41360
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in bgpd/bgp_packet.c. A remote attacker can read the initial byte of the ORF header in an ahead-of-stream situation.
MitigationUpdate the affected package frr to the latest version.
Vulnerable software versionsServer Applications Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
libfrr0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0: before 8.4-150500.4.8.1
frr-debugsource: before 8.4-150500.4.8.1
libfrrfpm_pb0-debuginfo: before 8.4-150500.4.8.1
libfrrsnmp0: before 8.4-150500.4.8.1
frr: before 8.4-150500.4.8.1
frr-debuginfo: before 8.4-150500.4.8.1
libfrrospfapiclient0-debuginfo: before 8.4-150500.4.8.1
libfrrfpm_pb0: before 8.4-150500.4.8.1
libfrrospfapiclient0: before 8.4-150500.4.8.1
libmlag_pb0-debuginfo: before 8.4-150500.4.8.1
libmlag_pb0: before 8.4-150500.4.8.1
libfrrsnmp0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0-debuginfo: before 8.4-150500.4.8.1
libfrrzmq0-debuginfo: before 8.4-150500.4.8.1
libfrr_pb0-debuginfo: before 8.4-150500.4.8.1
libfrr0: before 8.4-150500.4.8.1
frr-devel: before 8.4-150500.4.8.1
libfrr_pb0: before 8.4-150500.4.8.1
libfrrzmq0: before 8.4-150500.4.8.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20233709-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81445
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-41909
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the bgp_nlri_parse_flowspec() function in bgpd/bgp_flowspec.c. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package frr to the latest version.
Vulnerable software versionsServer Applications Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
libfrr0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0: before 8.4-150500.4.8.1
frr-debugsource: before 8.4-150500.4.8.1
libfrrfpm_pb0-debuginfo: before 8.4-150500.4.8.1
libfrrsnmp0: before 8.4-150500.4.8.1
frr: before 8.4-150500.4.8.1
frr-debuginfo: before 8.4-150500.4.8.1
libfrrospfapiclient0-debuginfo: before 8.4-150500.4.8.1
libfrrfpm_pb0: before 8.4-150500.4.8.1
libfrrospfapiclient0: before 8.4-150500.4.8.1
libmlag_pb0-debuginfo: before 8.4-150500.4.8.1
libmlag_pb0: before 8.4-150500.4.8.1
libfrrsnmp0-debuginfo: before 8.4-150500.4.8.1
libfrrcares0-debuginfo: before 8.4-150500.4.8.1
libfrrzmq0-debuginfo: before 8.4-150500.4.8.1
libfrr_pb0-debuginfo: before 8.4-150500.4.8.1
libfrr0: before 8.4-150500.4.8.1
frr-devel: before 8.4-150500.4.8.1
libfrr_pb0: before 8.4-150500.4.8.1
libfrrzmq0: before 8.4-150500.4.8.1
CPE2.3http://www.suse.com/support/update/announcement/2023/suse-su-20233709-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.