• Tenable
  • CVEs
  • Settings
    Links
    Tenable.io Tenable Community & Support Tenable University
    Severity
    Theme
  • Tenable
  • Links
  • Tenable.io
  • Tenable Community & Support
  • Tenable University
  • Settings
  • Severity
  • Theme
  • Newest
  • Updated
  • Search
  • Newest
  • Updated
  • Search
  1. CVEs
  2. CVE-2022-27239
  1. CVEs

CVE-2022-27239

high
  • Information
  • CPEs
  • Plugins

Description

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

References

http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba

https://bugzilla.samba.org/show_bug.cgi?id=15025

https://bugzilla.suse.com/show_bug.cgi?id=1197216

https://github.com/piastry/cifs-utils/pull/7

https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765

https://lists.fedoraproject.org/archives/list/[email protected]/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/

https://lists.fedoraproject.org/archives/list/[email protected]/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/

https://lists.fedoraproject.org/archives/list/[email protected]/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/

https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html

https://www.debian.org/security/2022/dsa-5157

Details

Source: MITRE

Published: 2022-04-27

Updated: 2022-10-05

Type: CWE-787

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

  • Tenable.com
  • Community & Support
  • Documentation
  • Education
  • © 2023 Tenable®, Inc. All Rights Reserved
  • Privacy Policy
  • Legal
  • 508 Compliance