Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2023-38802: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

SUSE: CVE-2023-38802: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/29/2023
Created
09/21/2023
Added
09/21/2023
Modified
09/28/2023

Description

FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).

Solution(s)

  • suse-upgrade-frr
  • suse-upgrade-frr-devel
  • suse-upgrade-libfpm_pb0
  • suse-upgrade-libfrr0
  • suse-upgrade-libfrr_pb0
  • suse-upgrade-libfrrcares0
  • suse-upgrade-libfrrfpm_pb0
  • suse-upgrade-libfrrgrpc_pb0
  • suse-upgrade-libfrrospfapiclient0
  • suse-upgrade-libfrrsnmp0
  • suse-upgrade-libfrrzmq0
  • suse-upgrade-libmlag_pb0
  • suse-upgrade-libospf0
  • suse-upgrade-libospfapiclient0
  • suse-upgrade-libquagga_pb0
  • suse-upgrade-libzebra1
  • suse-upgrade-quagga
  • suse-upgrade-quagga-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;