CVE-2022-23218Classic Buffer Overflow in Glibc

Severity
9.8CRITICALNVD
EPSS
0.4%
top 40.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateOct 15

Description

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

4
OSV
glibc vulnerabilities2022-03-07
GHSA
GHSA-8g8v-256r-57v7: The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 22022-01-15
CVEList
CVE-2022-23218: The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 22022-01-14
OSV
CVE-2022-23218: The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 22022-01-14

📋Vendor Advisories

6
Oracle
Oracle Oracle Communications Risk Matrix: Signaling (glibc) — CVE-2022-232182022-10-15
Ubuntu
GNU C Library vulnerabilities2022-03-07
Ubuntu
GNU C Library vulnerabilities2022-03-01
Red Hat
glibc: Stack-based buffer overflow in svcunix_create via long pathnames2022-01-12
Microsoft
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length which may re2022-01-11
CVE-2022-23218 — Classic Buffer Overflow in GNU Glibc | cvebase