Vulnerability Details : CVE-2022-34918
Public exploit exists!
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
Vulnerability category: Overflow
Products affected by CVE-2022-34918
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
- cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-34918
33.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2022-34918
-
Netfilter nft_set_elem_init Heap Overflow Privilege Escalation
Disclosure Date: 2022-02-07First seen: 2022-12-23exploit/linux/local/netfilter_nft_set_elem_init_privescAn issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges. The attacker can obtain root access, but must start with an unprivil
CVSS scores for CVE-2022-34918
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-34918
-
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-34918
-
http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
Kernel Live Patch Security Notice LSN-0089-1 ≈ Packet StormThird Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html
Netfilter nft_set_elem_init Heap Overflow Privilege Escalation ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.debian.org/security/2022/dsa-5191
Debian -- Security Information -- DSA-5191-1 linuxThird Party Advisory
-
https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u
[vs] Netfilter vulnerability disclosureExploit;Mailing List;Vendor Advisory
-
https://www.randorisec.fr/crack-linux-firewall/
[CVE-2022-34918] A crack in the Linux firewallExploit;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/08/06/5
oss-security - Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_initMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/07/05/1
oss-security - Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_initExploit;Mailing List;Third Party Advisory
-
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6
kernel/git/netdev/net.git - Netdev Group's networking treeMailing List;Patch;Vendor Advisory
-
https://security.netapp.com/advisory/ntap-20220826-0004/
CVE-2022-34918 Linux Kernel Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://www.openwall.com/lists/oss-security/2022/07/02/3
oss-security - Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_initExploit;Mailing List;Third Party Advisory
Jump to