Логотип exploitDog
bind:CVE-2022-23092
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-23092

Количество 3

Количество 3

nvd логотип

CVE-2022-23092

почти 2 года назад

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gvf3-496w-8fm9

почти 2 года назад

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-05217

больше 3 лет назад

Уязвимость библиотеки lib9p операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-23092

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-gvf3-496w-8fm9

The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory. The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2022-05217

Уязвимость библиотеки lib9p операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.9
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу