Vulnerability Details : CVE-2022-23092
The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.
The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.
Products affected by CVE-2022-23092
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2022-23092
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23092
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-29 |
CWE ids for CVE-2022-23092
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2022-23092
-
https://security.netapp.com/advisory/ntap-20240415-0009/
CVE-2022-23092 FreeBSD Vulnerability in NetApp Products | NetApp Product Security
-
https://security.freebsd.org/advisories/FreeBSD-SA-22:12.lib9p.asc
Jump to