Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems

Share:

The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be potentially exploited to crash the program or trigger remote code execution.

The issue, assigned the identifier CVE-2022-23093, impacts all supported versions of FreeBSD and concerns a stack-based buffer overflow vulnerability in the ping service.

“ping reads raw IP packets from the network to process responses in the pr_pack() function,” according to an advisory published last week.

 

“The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet.”

As a consequence, the destination buffer could be overflowed by up to 40 bytes when the IP option headers are present.

The FreeBSD Project noted that the ping process runs in a capability mode sandbox and is therefore constrained in how it can interact with the rest of the operating system.

OPNsense, an open source, FreeBSD-based firewall and routing software, has also released a patch (version 22.7.9) to plug the security hole, along with other issues.

The findings come as researchers from Qualys detailed another new vulnerability in the snap-confine program in the Linux operating system, building upon a previous privilege escalation flaw (CVE-2021-44731) that came to light in February 2022.

Snaps are self-contained application packages that can be distributed by upstream developers to users.

The new shortcoming (CVE-2022-3328), introduced as part of a patch for CVE-2021-44731, can be chained with two other flaws in multipathd called Leeloo Multipath – an authorization bypass and a symlink attack tracked as CVE-2022-41974 and CVE-2022-41973 – to gain root privileges.

Since the multipathd daemon runs by default as root, a successful exploitation of the flaws could enable an unprivileged threat actor to obtain the highest permissions on the vulnerable host and execute arbitrary code.

https://thehackernews.com/2022/12/critical-ping-vulnerability-allows.html

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
1:45 am, Jun 1, 2025
weather icon 15°C
L: 14° | H: 16°
clear sky
Humidity: 78 %
Pressure: 1015 mb
Wind: 5 mph SSW
Wind Gust: 9 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 4%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:49 am
Sunset: 9:07 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
14° | 16°°C 0.2 mm 20% 15 mph 80 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
11° | 21°°C 0 mm 0% 12 mph 82 % 1019 mb 0 mm/h
Tue Jun 03 10:00 pm
weather icon
11° | 18°°C 1 mm 100% 15 mph 93 % 1013 mb 0 mm/h
Wed Jun 04 10:00 pm
weather icon
9° | 18°°C 0.48 mm 48% 12 mph 81 % 1011 mb 0 mm/h
Thu Jun 05 10:00 pm
weather icon
11° | 15°°C 1 mm 100% 16 mph 94 % 1011 mb 0 mm/h
Today 4:00 am
weather icon
13° | 15°°C 0 mm 0% 8 mph 80 % 1014 mb 0 mm/h
Today 7:00 am
weather icon
13° | 14°°C 0 mm 0% 10 mph 76 % 1015 mb 0 mm/h
Today 10:00 am
weather icon
17° | 17°°C 0 mm 0% 11 mph 45 % 1015 mb 0 mm/h
Today 1:00 pm
weather icon
20° | 20°°C 0 mm 0% 12 mph 37 % 1014 mb 0 mm/h
Today 4:00 pm
weather icon
20° | 20°°C 0 mm 0% 15 mph 39 % 1013 mb 0 mm/h
Today 7:00 pm
weather icon
18° | 18°°C 0.2 mm 20% 11 mph 57 % 1014 mb 0 mm/h
Today 10:00 pm
weather icon
15° | 15°°C 0 mm 0% 8 mph 72 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
13° | 13°°C 0 mm 0% 7 mph 82 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,075.48
0.38%
Ethereum(ETH)
€2,221.64
-0.25%
Tether(USDT)
€0.88
0.00%
XRP(XRP)
€1.91
1.48%
Solana(SOL)
€137.68
-0.13%
USDC(USDC)
€0.88
-0.01%
Dogecoin(DOGE)
€0.169035
-0.46%
Shiba Inu(SHIB)
€0.000011
0.67%
Pepe(PEPE)
€0.000011
0.46%
Peanut the Squirrel(PNUT)
€0.229552
4.69%
Scroll to Top