CVE-2022-23093 (GCVE-0-2022-23093)
Vulnerability from cvelistv5
Published
2024-02-15 05:18
Modified
2024-10-28 18:30
Summary
ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that generated an ICMP error. The quoted packet again has an IP header and an ICMP header. The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes. The memory safety bugs described above can be triggered by a remote host, causing the ping program to crash. The ping process runs in a capability mode sandbox on all affected versions of FreeBSD and is thus very constrained in how it can interact with the rest of the system at the point where the bug can occur.
Impacted products
Vendor Product Version
FreeBSD FreeBSD Version: 13.1-RELEASE
Version: 12.4-RC2
Version: 12.3-RELEASE
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-23093",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-14T21:25:53.167040Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-120",
                "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T18:30:58.278Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:28:43.499Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:15.ping.asc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "modules": [
            "ping"
          ],
          "product": "FreeBSD",
          "vendor": "FreeBSD",
          "versions": [
            {
              "lessThan": "p5",
              "status": "affected",
              "version": "13.1-RELEASE",
              "versionType": "release"
            },
            {
              "lessThan": "p2",
              "status": "affected",
              "version": "12.4-RC2",
              "versionType": "release"
            },
            {
              "lessThan": "p10",
              "status": "affected",
              "version": "12.3-RELEASE",
              "versionType": "release"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "NetApp, Inc."
        }
      ],
      "datePublic": "2022-11-30T01:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "ping reads raw IP packets from the network to process responses in the pr_pack() function.  As part of processing a response ping has to\u00a0reconstruct the IP header, the ICMP header and if present a \"quoted\u00a0packet,\" which represents the packet that generated an ICMP error.  The\u00a0quoted packet again has an IP header and an ICMP header.\n\nThe pr_pack() copies received IP and ICMP headers into stack buffers\u00a0for further processing.  In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet.  When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.\n\nThe memory safety bugs described above can be triggered by a remote\u00a0host, causing the ping program to crash.\n\nThe ping process runs in a capability mode sandbox on all affected\u00a0versions of FreeBSD and is thus very constrained in how it can interact\u00a0with the rest of the system at the point where the bug can occur."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-15T05:18:44.628Z",
        "orgId": "63664ac6-956c-4cba-a5d0-f46076e16109",
        "shortName": "freebsd"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:15.ping.asc"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Stack overflow in ping(8)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "63664ac6-956c-4cba-a5d0-f46076e16109",
    "assignerShortName": "freebsd",
    "cveId": "CVE-2022-23093",
    "datePublished": "2024-02-15T05:18:44.628Z",
    "dateReserved": "2022-01-10T22:07:46.043Z",
    "dateUpdated": "2024-10-28T18:30:58.278Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-23093\",\"sourceIdentifier\":\"secteam@freebsd.org\",\"published\":\"2024-02-15T06:15:45.240\",\"lastModified\":\"2025-06-04T22:15:09.143\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ping reads raw IP packets from the network to process responses in the pr_pack() function.  As part of processing a response ping has to\u00a0reconstruct the IP header, the ICMP header and if present a \\\"quoted\u00a0packet,\\\" which represents the packet that generated an ICMP error.  The\u00a0quoted packet again has an IP header and an ICMP header.\\n\\nThe pr_pack() copies received IP and ICMP headers into stack buffers\u00a0for further processing.  In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet.  When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.\\n\\nThe memory safety bugs described above can be triggered by a remote\u00a0host, causing the ping program to crash.\\n\\nThe ping process runs in a capability mode sandbox on all affected\u00a0versions of FreeBSD and is thus very constrained in how it can interact\u00a0with the rest of the system at the point where the bug can occur.\"},{\"lang\":\"es\",\"value\":\"ping lee paquetes IP sin procesar de la red para procesar las respuestas en la funci\u00f3n pr_pack(). Como parte del procesamiento de una respuesta de ping, se debe reconstruir el encabezado IP, el encabezado ICMP y, si est\u00e1 presente, un \\\"paquete citado\\\", que representa el paquete que gener\u00f3 un error ICMP. El paquete citado nuevamente tiene un encabezado IP y un encabezado ICMP. pr_pack() copia los encabezados IP e ICMP recibidos en b\u00faferes de pila para su posterior procesamiento. Al hacerlo, no tiene en cuenta la posible presencia de encabezados de opciones de IP despu\u00e9s del encabezado de IP, ya sea en la respuesta o en el paquete citado. Cuando las opciones de IP est\u00e1n presentes, pr_pack() desborda el b\u00fafer de destino hasta en 40 bytes. Los errores de seguridad de la memoria descritos anteriormente pueden ser desencadenados por un host remoto, lo que provoca que el programa ping falle. El proceso de ping se ejecuta en un modo sandbox de capacidad en todas las versiones afectadas de FreeBSD y, por lo tanto, est\u00e1 muy limitado en cuanto a c\u00f3mo puede interactuar con el resto del sistema en el punto donde puede ocurrir el error.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E231B24D-5CA9-4107-A819-57EE116AD644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B6DCD8A-331E-419F-9253-C4D35C1DF54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4578E06C-16C6-435E-9E51-91CB02602355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FA1F6C-7E53-40F8-B9E1-5FD28D5DAADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC87BCE-17F0-479B-84DC-516C24FBD396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"620C23ED-400C-438C-8427-94437F12EDAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE99CB2-0B1E-4FAB-A7FB-C73E3131B0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"987270DD-4E16-4336-8F38-7C1A6C881B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"A057889D-8EB9-4C37-9381-96011F8498A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.3:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"21656E91-D625-45D7-B8A0-9E0DEFB393A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA821886-B26B-47A6-ABC9-B8F70CE0ACFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"66364EA4-83B1-4597-8C18-D5633B361A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF9292DD-EFB1-4B50-A941-7485D901489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB18F55-4F5C-4166-9A7E-6F6617179A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E1C269-841F-489A-9A0A-5D145B417E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECF1B567-F764-45F5-A793-BEA93720F952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAFE3F33-2C57-4B52-B658-82572607BD8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B536EE52-ED49-4A85-BC9D-A27828D5A961\"}]}]}],\"references\":[{\"url\":\"https://security.freebsd.org/advisories/FreeBSD-SA-22:15.ping.asc\",\"source\":\"secteam@freebsd.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.freebsd.org/advisories/FreeBSD-SA-22:15.ping.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.freebsd.org/advisories/FreeBSD-SA-22:15.ping.asc\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T03:28:43.499Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-23093\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-14T21:25:53.167040Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-120\", \"description\": \"CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:17.846Z\"}}], \"cna\": {\"title\": \"Stack overflow in ping(8)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"NetApp, Inc.\"}], \"affected\": [{\"vendor\": \"FreeBSD\", \"modules\": [\"ping\"], \"product\": \"FreeBSD\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.1-RELEASE\", \"lessThan\": \"p5\", \"versionType\": \"release\"}, {\"status\": \"affected\", \"version\": \"12.4-RC2\", \"lessThan\": \"p2\", \"versionType\": \"release\"}, {\"status\": \"affected\", \"version\": \"12.3-RELEASE\", \"lessThan\": \"p10\", \"versionType\": \"release\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2022-11-30T01:00:00.000Z\", \"references\": [{\"url\": \"https://security.freebsd.org/advisories/FreeBSD-SA-22:15.ping.asc\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ping reads raw IP packets from the network to process responses in the pr_pack() function.  As part of processing a response ping has to\\u00a0reconstruct the IP header, the ICMP header and if present a \\\"quoted\\u00a0packet,\\\" which represents the packet that generated an ICMP error.  The\\u00a0quoted packet again has an IP header and an ICMP header.\\n\\nThe pr_pack() copies received IP and ICMP headers into stack buffers\\u00a0for further processing.  In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet.  When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.\\n\\nThe memory safety bugs described above can be triggered by a remote\\u00a0host, causing the ping program to crash.\\n\\nThe ping process runs in a capability mode sandbox on all affected\\u00a0versions of FreeBSD and is thus very constrained in how it can interact\\u00a0with the rest of the system at the point where the bug can occur.\"}], \"providerMetadata\": {\"orgId\": \"63664ac6-956c-4cba-a5d0-f46076e16109\", \"shortName\": \"freebsd\", \"dateUpdated\": \"2024-02-15T05:18:44.628Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-23093\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-28T18:30:58.278Z\", \"dateReserved\": \"2022-01-10T22:07:46.043Z\", \"assignerOrgId\": \"63664ac6-956c-4cba-a5d0-f46076e16109\", \"datePublished\": \"2024-02-15T05:18:44.628Z\", \"assignerShortName\": \"freebsd\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…