Versio.io

CVE-2022-27239

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 27-04-2022 04:15
Last modified: - 03-06-2022 05:15
Total changes: - 8

Description

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=samba AND product=cifs-utils AND versionEndIncluding=6.14
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
vendor=Debian AND product=debian_linux AND version=11.0
OR
vendor=suse AND product=linux_enterprise_server AND version=11 AND update=sp4 AND software_edition=ltss
vendor=suse AND product=openstack_cloud AND version=8.0
vendor=suse AND product=linux_enterprise_server AND version=15 AND target_software=sap
vendor=suse AND product=linux_enterprise_software_development_kit AND version=12 AND update=sp5
vendor=suse AND product=openstack_cloud_crowbar AND version=8.0
vendor=suse AND product=openstack_cloud_crowbar AND version=9.0
vendor=suse AND product=openstack_cloud AND version=9.0
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp3 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp3 AND target_software=sap
vendor=suse AND product=linux_enterprise_server AND version=11 AND update=sp3 AND target_software=-
vendor=suse AND product=manager_server AND version=4.1
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp5 AND target_software=sap
vendor=suse AND product=linux_enterprise_desktop AND version=15 AND update=sp3
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=sp3
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=sp4
vendor=suse AND product=linux_enterprise_desktop AND version=15 AND update=sp4
vendor=suse AND product=enterprise_storage AND version=7.0
vendor=suse AND product=caas_platform AND version=4.0
vendor=suse AND product=enterprise_storage AND version=6.0
vendor=suse AND product=manager_proxy AND version=4.1
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=- AND software_edition=espos
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=- AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=sp1 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=sp2 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=12.0 AND update=sp5 AND software_edition=-
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=- AND software_edition=ltss
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=sp1 AND software_edition=espos
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=sp1 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=sp2 AND software_edition=espos
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=sp2 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=sp3 AND software_edition=-
vendor=suse AND product=linux_enterprise_high_performance_computing AND version=15.0 AND update=sp4 AND software_edition=-
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp4 AND software_edition=espos
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp4 AND software_edition=ltss
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp3 AND software_edition=espos
vendor=suse AND product=linux_enterprise_real_time AND version=15.0 AND update=sp2
vendor=suse AND product=linux_enterprise_point_of_service AND version=11.0 AND update=sp3
vendor=suse AND product=linux_enterprise_micro AND version=5.2 AND target_software=rancher
vendor=suse AND product=linux_enterprise_micro AND version=5.2 AND target_software=-
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp2 AND software_edition=business_critical_linux AND target_software=-
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp3 AND software_edition=business_critical_linux AND target_software=-
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=sp1 AND software_edition=business_critical_linux AND target_software=-
vendor=suse AND product=linux_enterprise_server AND version=15 AND update=sp2 AND software_edition=business_critical_linux AND target_software=-
vendor=suse AND product=linux_enterprise_server AND version=12 AND update=sp4 AND software_edition=- AND target_software=sap
vendor=suse AND product=manager_retail_branch_server AND version=4.2
vendor=suse AND product=manager_retail_branch_server AND version=4.1
vendor=suse AND product=manager_retail_branch_server AND version=4.3
vendor=suse AND product=manager_server AND version=4.2
vendor=suse AND product=manager_server AND version=4.3
vendor=suse AND product=manager_proxy AND version=4.2
vendor=suse AND product=manager_proxy AND version=4.3
vendor=suse AND product=linux_enterprise_storage AND version=7.1
OR
vendor=hp AND product=helion_openstack AND version=8.0
 

Reference

 


Keywords

NVD

 

CVE-2022-27239

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.