CVE-2023-41359
📋 TL;DR
CVE-2023-41359 is an out-of-bounds read vulnerability in FRRouting FRR's BGP daemon that occurs during AIGP attribute validation. Attackers could exploit this to cause denial of service or potentially leak sensitive memory contents. Organizations running FRR for BGP routing are affected.
💻 Affected Systems
- FRRouting FRR
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Frrouting by Frrouting
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, though this requires specific memory layout conditions.
Likely Case
Denial of service through BGP daemon crash, disrupting network routing.
If Mitigated
Limited impact with proper network segmentation and BGP session filtering.
🎯 Exploit Status
Exploitation requires sending specially crafted BGP packets with AIGP attributes.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.0.1 and later, or apply commit from PR #14232
Vendor Advisory: https://github.com/FRRouting/frr/pull/14232
Restart Required: Yes
Instructions:
1. Update FRR to version 9.0.1 or later. 2. Restart bgpd service: 'systemctl restart frr' or 'service frr restart'. 3. Verify BGP sessions re-establish.
🔧 Temporary Workarounds
Filter AIGP attributes
linuxUse BGP route-maps to filter or reject routes containing AIGP attributes
route-map FILTER-AIGP deny 10
match aigp
route-map FILTER-AIGP permit 20
neighbor <peer> route-map FILTER-AIGP in
🧯 If You Can't Patch
- Implement strict BGP session filtering to trusted peers only
- Deploy network-based intrusion detection to monitor for anomalous BGP packets
🔍 How to Verify
Check if Vulnerable:
Check FRR version: 'frr --version' or 'vtysh -c 'show version''. If version is 9.0 or earlier, system is vulnerable.
Check Version:
frr --version
Verify Fix Applied:
Verify FRR version is 9.0.1 or later, and check that BGP sessions are stable after applying patch.
📡 Detection & Monitoring
Log Indicators:
- BGP daemon crashes
- Segmentation fault errors in frr logs
- Unexpected BGP session resets
Network Indicators:
- Malformed BGP packets with AIGP attributes
- Unusual BGP update patterns
SIEM Query:
source="frr.log" AND ("segmentation fault" OR "crash" OR "bgpd terminated")
🔗 References
- https://github.com/FRRouting/frr/pull/14232
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/
- https://github.com/FRRouting/frr/pull/14232
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/