7.8
CVSSv3

CVE-2022-27239

Published: 27/04/2022 Updated: 24/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In cifs-utils up to and including 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

samba cifs-utils

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

suse linux enterprise server 11

suse openstack cloud 8.0

suse linux enterprise server 15

suse linux enterprise software development kit 12

suse openstack cloud crowbar 8.0

suse openstack cloud crowbar 9.0

suse openstack cloud 9.0

suse linux enterprise server 12

suse manager server 4.1

suse linux enterprise desktop 15

suse enterprise storage 7.0

suse caas platform 4.0

suse enterprise storage 6.0

suse manager proxy 4.1

suse linux enterprise high performance computing 12.0

suse linux enterprise high performance computing 15.0

suse linux enterprise real time 15.0

suse linux enterprise point of service 11.0

suse linux enterprise micro 5.2

suse manager retail branch server 4.2

suse manager retail branch server 4.1

suse manager retail branch server 4.3

suse manager server 4.2

suse manager server 4.3

suse manager proxy 4.2

suse manager proxy 4.3

suse linux enterprise storage 7.1

hp helion openstack 8.0

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Debian Bug report logs - #1010818 cifs-utils: CVE-2022-27239 CVE-2022-29869 Package: src:cifs-utils; Maintainer for src:cifs-utils is Debian Samba Maintainers <pkg-samba-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 10 May 2022 19:33:02 UTC Severity: grave Tags: patc ...
Several security issues were fixed in cifs-utils ...
Jeffrey Bencteux reported two vulnerabilities in cifs-utils, the Common Internet File System utilities, which can result in escalation of privileges (CVE-2022-27239) or an information leak (CVE-2022-29869) For the oldstable distribution (buster), these problems have been fixed in version 2:68-2+deb10u1 For the stable distribution (bullseye), the ...
A stack-based buffer overflow issue was found in pifs-utils Parsing the mountcifs ip command-line argument can lead to local attackers gaining root privileges (CVE-2022-27239) ...
A stack-based buffer overflow issue was found in pifs-utils Parsing the mountcifs ip command-line argument can lead to local attackers gaining root privileges (CVE-2022-27239) A flaw was found in cifs-utils When verbose logging is enabled, invalid credentials file lines may be dumped to stderr This may lead to information disclosure in particu ...
A stack-based buffer overflow issue was found in pifs-utils Parsing the mountcifs ip command-line argument can lead to local attackers gaining root privileges (CVE-2022-27239) ...
In cifs-utils through 614, a stack-based buffer overflow when parsing the mountcifs ip= command-line argument could lead to local attackers gaining root privileges ...
A stack-based buffer overflow issue was found in pifs-utils Parsing the mountcifs ip command-line argument can lead to local attackers gaining root privileges (CVE-2022-27239) A flaw was found in cifs-utils When verbose logging is enabled, invalid credentials file lines may be dumped to stderr This may lead to information disclosure in particu ...
A stack-based buffer overflow issue was found in pifs-utils Parsing the mountcifs ip command-line argument can lead to local attackers gaining root privileges (CVE-2022-27239) A flaw was found in cifs-utils When verbose logging is enabled, invalid credentials file lines may be dumped to stderr This may lead to information disclosure in particu ...