Security Advisory Description
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer. (CVE-2022-28733)
Impact
This flaw allows an attacker to craft a malicious packet, triggering an integer underflow in grub code. Consequently, the memory allocation for handling the packet data may be smaller than the size needed. This issue causes an out-of-bands write during packet handling, compromising data integrity, confidentiality issues, a denial of service, and remote code execution.
CPE | Name | Operator | Version |
---|---|---|---|
big-ip aam | eq | 13.1.0 | |
big-ip aam | eq | 13.1.1 | |
big-ip aam | eq | 13.1.3 | |
big-ip aam | eq | 13.1.4 | |
big-ip aam | eq | 13.1.5 | |
big-ip aam | eq | 14.1.0 | |
big-ip aam | eq | 14.1.2 | |
big-ip aam | eq | 14.1.3 | |
big-ip aam | eq | 14.1.4 | |
big-ip aam | eq | 14.1.5 |