HIGH · 7.8

CVE-2022-27239

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

Vulnerability Description

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVSS Score

7.8

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
SambaCifs-Utils< 6.15
DebianDebian Linux9.0
SuseCaas Platform4.0
SuseEnterprise Storage6.0
SuseLinux Enterprise Point Of Service11.0
SuseLinux Enterprise Storage7.1
SuseManager Proxy4.1
SuseManager Retail Branch Server4.1
SuseManager Server4.1
SuseOpenstack Cloud8.0
SuseOpenstack Cloud Crowbar8.0
SuseLinux Enterprise Desktop15
SuseLinux Enterprise High Performance Computing12.0
SuseLinux Enterprise Micro5.2
SuseLinux Enterprise Real Time15.0
SuseLinux Enterprise Server11
SuseLinux Enterprise Software Development Kit12
HpHelion Openstack8.0
FedoraprojectFedora34

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-27239?

CVE-2022-27239 is a vulnerability with a CVSS score of 7.8 (HIGH). In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

How severe is CVE-2022-27239?

CVE-2022-27239 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-27239?

Check the references section above for vendor advisories and patch information. Affected products include: Samba Cifs-Utils, Debian Debian Linux, Suse Caas Platform, Suse Enterprise Storage, Suse Linux Enterprise Point Of Service.