{"id":4064,"date":"2022-12-06T19:59:34","date_gmt":"2022-12-06T18:59:34","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=4064"},"modified":"2022-12-06T20:19:46","modified_gmt":"2022-12-06T19:19:46","slug":"kriticna-ping-ranjivost-u-freebsd-sistemima","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/12\/06\/kriticna-ping-ranjivost-u-freebsd-sistemima\/","title":{"rendered":"Kriti\u010dna ping ranjivost u FreeBSD sistemima"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Tvorci <em>FreeBSD<\/em> sistema objavili su a\u017euriranje koje bi trebalo da ispravi ranjivost vezanu za <em>ping<\/em> modul u ovom sistemu. Ranjivost je ozna\u010dena kao <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-30293\" target=\"_blank\" rel=\"noopener\"><em>CVE-2022-23093<\/em><\/a> i mo\u017ee omogu\u0107iti napada\u010du da sru\u0161i sistem ili pokrene daljinsko izvr\u0161avanje k\u00f4da, a pogo\u0111ene su sve verzije <em>FreeBSD<\/em> sistema.<\/span><\/p>\n<div id=\"attachment_4067\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4067\" class=\"size-full wp-image-4067\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/12\/freebsd.jpg\" alt=\"freebsd vulnerability\" width=\"1024\" height=\"576\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/12\/freebsd.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/12\/freebsd-300x169.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/12\/freebsd-768x432.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/12\/freebsd-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-4067\" class=\"wp-caption-text\"><em>Source: <a href=\"https:\/\/wallpapercave.com\/w\/oTySvJh\" target=\"_blank\" rel=\"noopener\">Wallpapercave<\/a>; Edit by Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>\n<p><span style=\"font-size: 14pt;\">U ovom slu\u010daju, <em>ping<\/em> \u010dita sirove <em>IP<\/em> pakete sa mre\u017ee da bi obradio odgovore u funkciji koja kopira primljena <em>IP<\/em> i <em>ICMP<\/em> zaglavlja u buferu za dalju obradu. Na taj na\u010din ne uzima u obzir mogu\u0107e prisustvo opcionalnih <em>IP<\/em> zaglavlja koji slijede primljeno<em> IP<\/em> zaglavlje. Kao posljedicu, to mo\u017ee preliti odredi\u0161ni bafer do 40 bajtova kada su prisutna opcionalna <em>IP<\/em> zaglavlja \u2013 kako je navedeno u <a href=\"https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-22:15.ping.asc\" target=\"_blank\" rel=\"noopener\">objavi<\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\">Projekat <em>FreeBSD<\/em> je objavio a\u017euriranje za ovu ranjivost koje dostupno korisnicima koji nadograde svoje sisteme na <em>FreeBSD 13.1-STABLE<\/em>, <em>13.1-RELEASE-p5<\/em>, <em>12.4-STABLE<\/em>, <em>12.4-RC2-p2<\/em> i <em>12.3-RELEASE-p10<\/em>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\">Za ovu ranjivost ne postoji drugo rje\u0161enje osim primjene a\u017euriranja, pa se korisnicima <em>FreeBSD<\/em> sistema savjetuje da primjene a\u017euriranje. Oni to mogu da urade a\u017euriranjem operativnog sistema ili putem zakrpe binarnog ili izvornog koda.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Tvorci FreeBSD sistema objavili su a\u017euriranje koje bi trebalo da ispravi ranjivost vezanu za ping modul u ovom sistemu. Ranjivost je ozna\u010dena kao CVE-2022-23093 i mo\u017ee omogu\u0107iti napada\u010du da sru\u0161i sistem ili pokrene daljinsko&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":4067,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[232,193,126],"class_list":["post-4064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-frebsd","tag-ip","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=4064"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/4067"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=4064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=4064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=4064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}