Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-39193

Опубликовано: 12 окт. 2023
Источник: msrc
CVSS3: 6
EPSS Низкий

Описание

Kernel: netfilter: xtables sctp out-of-bounds read in match_flags()

EPSS

Процентиль: 0%
0.00008
Низкий

6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
redhat
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
nvd
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

CVSS3: 6.1
debian
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The s ...

CVSS3: 5.1
github
около 2 лет назад

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.

EPSS

Процентиль: 0%
0.00008
Низкий

6 Medium

CVSS3