The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer.
While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: freebsd
Published: 2024-02-15T05:03:38.536Z
Updated: 2024-08-03T03:28:43.494Z
Reserved: 2022-01-10T22:07:46.041Z
Link: CVE-2022-23088
Vulnrichment
Updated: 2024-08-03T03:28:43.494Z
NVD
Status : Awaiting Analysis
Published: 2024-02-15T05:15:09.440
Modified: 2024-08-01T13:42:36.930
Link: CVE-2022-23088
Redhat
No data.