8.1

CVE-2023-3297

Exploit

In Ubuntu's accountsservice an unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process.

Data is provided by the National Vulnerability Database (NVD)
CanonicalAccountsservice Version < 23.13.9-2ubuntu2
   LinuxLinux Kernel Version-
CanonicalAccountsservice Version < 22.08.8-1ubuntu7.1
   CanonicalUbuntu Linux Version23.04
CanonicalAccountsservice Version < 22.08.8-1ubuntu7.1
   CanonicalUbuntu Linux Version22.10 SwEdition-
CanonicalAccountsservice Version < 22.07.5-2ubuntu1.4
   CanonicalUbuntu Linux Version22.04 SwEditionlts
CanonicalAccountsservice Version < 0.6.55-0ubuntu12\~20.04.6
   CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalUbuntu Linux Version20.04 SwEditionlts
CanonicalUbuntu Linux Version22.04 SwEditionlts
CanonicalUbuntu Linux Version22.10 SwEdition-
CanonicalUbuntu Linux Version23.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.177
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
security@ubuntu.com 8.1 1.4 6
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.