CVE-2022-23219Classic Buffer Overflow in Glibc

Severity
9.8CRITICALNVD
EPSS
0.4%
top 40.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateJan 15

Description

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages8 packages

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

4
OSV
glibc vulnerabilities2022-03-07
GHSA
GHSA-fhxm-4mc9-6jf5: The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 22022-01-15
OSV
CVE-2022-23219: The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 22022-01-14
CVEList
CVE-2022-23219: The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 22022-01-14

📋Vendor Advisories

8
Oracle
Oracle Oracle Systems Risk Matrix: XCP Firmware (glibc) — CVE-2022-232192023-01-15
Oracle
Oracle Oracle Communications Risk Matrix: Routing (glibc) — CVE-2022-232192022-10-15
Oracle
Oracle Oracle Communications Risk Matrix: BSF (glibc) — CVE-2022-232192022-07-15
Ubuntu
GNU C Library vulnerabilities2022-03-07
Ubuntu
GNU C Library vulnerabilities2022-03-01
CVE-2022-23219 — Classic Buffer Overflow in GNU Glibc | cvebase