7.8

CVE-2022-27239

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SambaCifs-utils Version < 6.15
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
SuseCaas Platform Version4.0
SuseEnterprise Storage Version6.0
SuseEnterprise Storage Version7.0
SuseLinux Enterprise Point Of Service Version11.0 Updatesp3
SuseManager Proxy Version4.1
SuseManager Proxy Version4.2
SuseManager Proxy Version4.3
SuseManager Server Version4.1
SuseManager Server Version4.2
SuseManager Server Version4.3
SuseOpenstack Cloud Version8.0
SuseOpenstack Cloud Version9.0
SuseOpenstack Cloud Crowbar Version8.0
SuseOpenstack Cloud Crowbar Version9.0
SuseLinux Enterprise Desktop Version15 Updatesp3
SuseLinux Enterprise Desktop Version15 Updatesp4
SuseLinux Enterprise High Performance Computing Version12.0 Updatesp5 SwEdition-
SuseLinux Enterprise High Performance Computing Version15.0 Update- SwEditionltss
SuseLinux Enterprise High Performance Computing Version15.0 Updatesp1 SwEditionespos
SuseLinux Enterprise High Performance Computing Version15.0 Updatesp1 SwEditionltss
SuseLinux Enterprise High Performance Computing Version15.0 Updatesp2 SwEditionespos
SuseLinux Enterprise High Performance Computing Version15.0 Updatesp2 SwEditionltss
SuseLinux Enterprise High Performance Computing Version15.0 Updatesp3 SwEdition-
SuseLinux Enterprise High Performance Computing Version15.0 Updatesp4 SwEdition-
SuseLinux Enterprise Micro Version5.2 SwPlatform-
SuseLinux Enterprise Micro Version5.2 SwPlatformrancher
SuseLinux Enterprise Real Time Version15.0 Updatesp2
SuseLinux Enterprise Server Version11 Updatesp3 SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp4 SwEditionltss
SuseLinux Enterprise Server Version12 Updatesp2 SwEditionbusiness_critical_linux SwPlatform-
SuseLinux Enterprise Server Version12 Updatesp3 SwPlatformsap
SuseLinux Enterprise Server Version12 Updatesp3 SwEditionbusiness_critical_linux SwPlatform-
SuseLinux Enterprise Server Version12 Updatesp3 SwEditionespos
SuseLinux Enterprise Server Version12 Updatesp3 SwEditionltss
SuseLinux Enterprise Server Version12 Updatesp4 SwEdition- SwPlatformsap
SuseLinux Enterprise Server Version12 Updatesp4 SwEditionespos
SuseLinux Enterprise Server Version12 Updatesp4 SwEditionltss
SuseLinux Enterprise Server Version12 Updatesp5 SwPlatformsap
SuseLinux Enterprise Server Version15 SwPlatformsap
SuseLinux Enterprise Server Version15 Update- SwEditionespos
SuseLinux Enterprise Server Version15 Update- SwEditionltss
SuseLinux Enterprise Server Version15 Updatesp1 SwEditionbusiness_critical_linux SwPlatform-
SuseLinux Enterprise Server Version15 Updatesp1 SwEditionltss
SuseLinux Enterprise Server Version15 Updatesp2 SwEditionbusiness_critical_linux SwPlatform-
SuseLinux Enterprise Server Version15 Updatesp2 SwEditionltss
SuseLinux Enterprise Server Version15 Updatesp3
SuseLinux Enterprise Server Version15 Updatesp4
HpHelion Openstack Version8.0
FedoraprojectFedora Version34
FedoraprojectFedora Version35
FedoraprojectFedora Version36
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.12% 0.323
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.