An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.
Se ha detectado un problema en bgpd en FRRouting (FRR) 8.3. En las funciones bgp_notify_send_with_data() y bgp_process_packet() en el archivo bgp_packet.c, se presenta un posible uso de memoria previamente liberada debido a una condición de carrera. Esto podría conllevar una Ejecución de Código Remota o ua Divulgación de Información mediante el envío de paquetes BGP diseñados. No es requerida una interacción del usuario para la explotación
It was discovered that FRR incorrectly handled parsing certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service. It was discovered that FRR incorrectly handled processing certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service, obtain sensitive information, or execute arbitrary code.