Vulnerability Details : CVE-2022-27239
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2022-27239
- cpe:2.3:a:hp:helion_openstack:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:15:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp1:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp5:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_proxy:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:suse:caas_platform:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud_crowbar:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:openstack_cloud_crowbar:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:enterprise_storage:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_server:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_server:4.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:12.0:sp5:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:-:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp1:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_performance_computing:15.0:sp3:*:*:-:*:*:*
- cpe:2.3:a:suse:linux_enterprise_point_of_service:11.0:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:rancher:*:*
- cpe:2.3:o:suse:linux_enterprise_micro:5.2:*:*:*:*:-:*:*
- cpe:2.3:a:suse:manager_retail_branch_server:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_retail_branch_server:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:suse:manager_retail_branch_server:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_storage:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:cifs-utils:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-27239
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-27239
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-27239
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-27239
-
https://github.com/piastry/cifs-utils/pull/7
mount.cifs: two bug fixes by ddiss · Pull Request #7 · piastry/cifs-utils · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5157
Debian -- Security Information -- DSA-5157-1 cifs-utilsThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/
[SECURITY] Fedora 36 Update: cifs-utils-6.15-1.fc36 - package-announce - Fedora Mailing-Lists
-
https://bugzilla.samba.org/show_bug.cgi?id=15025
Issue Tracking;Permissions Required;Vendor Advisory
-
https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765
mount.cifs: two bug fixes by ddiss · Pull Request #7 · piastry/cifs-utils · GitHubPatch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/
[SECURITY] Fedora 36 Update: cifs-utils-6.15-1.fc36 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/
[SECURITY] Fedora 35 Update: cifs-utils-6.15-1.fc35 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/
[SECURITY] Fedora 34 Update: cifs-utils-6.15-1.fc34 - package-announce - Fedora Mailing-Lists
-
http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba
Linux CIFS Utils and Samba - Free Knowledge Base- The DUCK Project: information for everyoneThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676/
[SECURITY] Fedora 35 Update: cifs-utils-6.15-1.fc35 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202311-05
LinuxCIFS utils: Multiple Vulnerabilities (GLSA 202311-05) — Gentoo security
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY/
[SECURITY] Fedora 34 Update: cifs-utils-6.15-1.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=1197216
Bug 1197216 – VUL-0: CVE-2022-27239: cifs-utils: buffer overflow in commandline ip= handlingIssue Tracking;Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html
[SECURITY] [DLA 3009-1] cifs-utils security updateMailing List;Third Party Advisory
Jump to