7.5
CVSSv3

CVE-2022-41716

Published: 02/11/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

golang go

Vendor Advisories

ReaderRead does not set a limit on the maximum size of file headers A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics After fix, ReaderRead limits the maximum size of header blocks to 1 MiB (CVE-2022-2879) Programs which compile regular expressions from unt ...
ALAS-2022-239 Amazon Linux 2022 Security Advisory: ALAS-2022-239 Advisory Release Date: 2022-12-06 16:43 Pacific ...
ALAS-2022-240 Amazon Linux 2022 Security Advisory: ALAS-2022-240 Advisory Release Date: 2022-12-06 16:43 Pacific ...
PAN-SA-2024-0001 Informational Bulletin: Impact of OSS CVEs in PAN-OS ...