We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-23088

802.11 heap buffer overflow



Assignerfreebsd
Reserved2022-01-10
Published2024-02-15
Updated2024-08-03

Description

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.

Product status

Default status
unknown

13.1-RC1 before p1
affected

13.0-RELEASE before p11
affected

12.3-RELEASE before p5
affected

Credits

m00nbsd 0x4007627e00

Trend Micro Zero Day Initiative 0x4007627e20

References

https://security.freebsd.org/advisories/FreeBSD-SA-22:07.wifi_meshid.asc vendor-advisory

cve.org CVE-2022-23088

nvd.nist.gov CVE-2022-23088

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.