5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7.6 High
AI Score
Confidence
Low
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.2%
Software: protobuf-c 1.3.0
OS: ROSA Virtualization 2.1
package_evr_string: protobuf-c-1.3.0-8.rv3
CVE-ID: CVE-2022-48468
BDU-ID: 2023-03313
CVE-Crit: HIGH
CVE-DESC.: A vulnerability in the parse_required_member() function of the protobuf-c data serialization protocol is related to integer overflow. Exploitation of the vulnerability could allow an attacker acting remotely to execute arbitrary code and cause the system to be completely compromised
CVE-STATUS: Resolved
CVE-REV: To close, run the yum update protobuf-c command.
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7.6 High
AI Score
Confidence
Low
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
5.2%