Lucene search

K
nvd[email protected]NVD:CVE-2023-3812
HistoryJul 24, 2023 - 4:15 p.m.

CVE-2023-3812

2023-07-2416:15:13
CWE-416
CWE-787
web.nvd.nist.gov
cve-2023-3812
out-of-bounds
networking packet
local user
privilege escalation
linux kernel

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.7%

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Affected configurations

NVD
Node
linuxlinux_kernelRange4.154.19.265
OR
linuxlinux_kernelRange4.205.4.224
OR
linuxlinux_kernelRange5.55.10.154
OR
linuxlinux_kernelRange5.115.15.78
OR
linuxlinux_kernelRange5.166.0.8
Node
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.7%