Lucene search

K
cve[email protected]CVE-2023-0179
HistoryMar 27, 2023 - 10:15 p.m.

CVE-2023-0179

2023-03-2722:15:20
CWE-190
web.nvd.nist.gov
152
20
cve-2023-0179
buffer overflow
netfilter
linux kernel
local privilege escalation

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.

Affected configurations

NVD
Node
linuxlinux_kernelRange5.5.05.10.164
OR
linuxlinux_kernelRange5.115.15.89
OR
linuxlinux_kernelRange5.166.1.7
Node
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch18.04lts
OR
canonicalubuntu_linuxMatch20.04lts
OR
canonicalubuntu_linuxMatch22.04lts
Node
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
Node
redhatenterprise_linuxMatch9.0
OR
redhatenterprise_linux_eusMatch9.0
OR
redhatenterprise_linux_for_ibm_z_systemsMatch9.0
OR
redhatenterprise_linux_for_power_little_endianMatch9.0
OR
redhatenterprise_linux_for_power_little_endian_eusMatch9.0
OR
redhatenterprise_linux_for_real_timeMatch9.0
OR
redhatenterprise_linux_for_real_time_for_nfvMatch9.0
OR
redhatenterprise_linux_serverMatch9.0
OR
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsMatch9.0
Node
redhatcodeready_linux_builderMatch-
AND
redhatenterprise_linuxMatch9.0
OR
redhatenterprise_linux_eusMatch9.0
OR
redhatenterprise_linux_for_ibm_z_systemsMatch9.0
OR
redhatenterprise_linux_for_ibm_z_systems_eusMatch9.0
OR
redhatenterprise_linux_for_power_little_endianMatch9.0
OR
redhatenterprise_linux_for_power_little_endian_eusMatch9.0
OR
redhatenterprise_linux_serverMatch9.0

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "kernel",
    "versions": [
      {
        "version": "unknown",
        "status": "affected"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%