CVE-2022-23219

CRITICAL

GNU Glibc < 2.31 - Buffer Overflow

Title source: rule
STIX 2.1

Description

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

References (4)

Core 4
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202208-24
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
Exploit, Issue Tracking, Third Party Advisory
https://sourceware.org/bugzilla/show_bug.cgi?id=22542

Scores

CVSS v3 9.8
EPSS 0.0038
EPSS Percentile 59.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-120
Status published
Products (11)
debian/debian_linux 10.0
gnu/glibc < 2.31
oracle/communications_cloud_native_core_binding_support_function 22.1.3
oracle/communications_cloud_native_core_network_function_cloud_native_environment 22.1.0
oracle/communications_cloud_native_core_network_repository_function 22.1.2
oracle/communications_cloud_native_core_network_repository_function 22.2.0
oracle/communications_cloud_native_core_security_edge_protection_proxy 22.1.1
oracle/communications_cloud_native_core_unified_data_repository 22.2.0
oracle/enterprise_operations_monitor 4.3
oracle/enterprise_operations_monitor 4.4
... and 1 more
Published Jan 14, 2022
Tracked Since Feb 18, 2026