We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-23088

802.11 heap buffer overflow



Description

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.

Reserved 2022-01-10 | Published 2024-02-15 | Updated 2024-08-03 | Assigner freebsd

Product status

Default status
unknown

13.1-RC1 before p1
affected

13.0-RELEASE before p11
affected

12.3-RELEASE before p5
affected

Credits

m00nbsd finder

Trend Micro Zero Day Initiative finder

References

security.freebsd.org/...ies/FreeBSD-SA-22:07.wifi_meshid.asc vendor-advisory

cve.org (CVE-2022-23088)

nvd.nist.gov (CVE-2022-23088)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-23088

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.