CVE-2022-27239Out-of-bounds Write in Samba Cifs-utils

CWE-787Out-of-bounds Write11 documents8 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 78.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 27
Latest updateAug 7

Description

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages17 packages

NVDsamba/cifs-utils< 6.15
Debiansamba/cifs-utils< 2:6.11-3.1+deb11u1+3
NVDsuse/openstack_cloud8.0, 9.0+1

Also affects: Debian Linux 10.0, 11.0, 9.0, Fedora 34, 35, 36, Linux Enterprise Micro 5.2

Patches

🔴Vulnerability Details

5
OSV
cifs-utils vulnerabilities2025-08-07
OSV
cifs-utils vulnerabilities2022-06-02
GHSA
GHSA-mhc8-vv44-hh59: In cifs-utils through 62022-04-28
OSV
CVE-2022-27239: In cifs-utils through 62022-04-27
CVEList
CVE-2022-27239: In cifs-utils through 62022-04-27

📋Vendor Advisories

5
Ubuntu
cifs-utils vulnerabilities2025-08-07
Ubuntu
cifs-utils vulnerabilities2022-06-02
Red Hat
cifs-utils: stack-based buffer overflow mount.cifs may lead to local privilege escalation to root2022-04-27
Microsoft
In cifs-utils through 6.14 a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.2022-04-12
Debian
CVE-2022-27239: cifs-utils - In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount...2022