The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.
While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
References
Configurations
No configuration.
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.freebsd.org/advisories/FreeBSD-SA-22:07.wifi_meshid.ascĀ - |
01 Aug 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-94 |
15 Feb 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-15 05:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-23088
Mitre link : CVE-2022-23088
CVE.ORG link : CVE-2022-23088
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')