Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-20423

Опубликовано: 11 окт. 2022
Источник: debian
EPSS Низкий

Описание

In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.16.18-1package
linuxfixed5.10.113-1bullseyepackage
linuxfixed4.19.249-1busterpackage

Примечания

  • https://source.android.com/docs/security/bulletin/2022-10-01

  • https://git.kernel.org/linus/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa (5.17)

EPSS

Процентиль: 20%
0.00065
Низкий

Связанные уязвимости

CVSS3: 4.6
ubuntu
больше 3 лет назад

In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel

CVSS3: 4.6
nvd
больше 3 лет назад

In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel

CVSS3: 4.6
github
больше 3 лет назад

In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel

CVSS3: 4.6
fstec
почти 4 года назад

Уязвимость функции rndis_set_response() драйвера USB в модуле rndis.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе

EPSS

Процентиль: 20%
0.00065
Низкий