The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published: 2024-02-15T05:03:38.536Z

Updated: 2024-08-03T03:28:43.494Z

Reserved: 2022-01-10T22:07:46.041Z

Link: CVE-2022-23088

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:43.494Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-15T05:15:09.440

Modified: 2024-08-01T13:42:36.930

Link: CVE-2022-23088

cve-icon Redhat

No data.