The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.
The memory safety bugs described above can be triggered by a remote host, causing the ping program to crash.
The ping process runs in a capability mode sandbox on all affected versions of FreeBSD and is thus very constrained in how it can interact with the rest of the system at the point where the bug can occur.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Jun 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freebsd
Freebsd freebsd |
|
| CPEs | cpe:2.3:o:freebsd:freebsd:12.3:beta1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.3:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:* |
|
| Vendors & Products |
Freebsd
Freebsd freebsd |
Mon, 28 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2024-10-28T18:30:58.278Z
Reserved: 2022-01-10T22:07:46.043Z
Link: CVE-2022-23093
Updated: 2024-08-03T03:28:43.499Z
Status : Analyzed
Published: 2024-02-15T06:15:45.240
Modified: 2025-06-04T22:15:09.143
Link: CVE-2022-23093
No data.
OpenCVE Enrichment
No data.