Linux Kernel IPv6 ipv6_renew_options Uskraćivanje usluge

Pronađena je ranjivost klasifikovana kao Problematiиno u Linux Kernel. Zahvaćeno je funkcija ipv6_renew_options u komponenti IPv6 Handler. Izmena rezultira Uskraćivanje usluge. Upotreba CWE za identifikaciju problema vodi ka CWE-401. Ova slabost je objavljena 10/16/2022. Izveštaj je podeljen za preuzimanje na git.kernel.org. Ova bezbednosna slabost se vodi pod oznakom CVE-2022-3524. Postoji mogućnost pokretanja napada sa udaljene lokacije. Napad se mora sprovesti u okviru lokalne mreže. Tehničke informacije su dostupne. Експлоит није доступан. Trenutno je cena za eksploataciju približno USD $0-$5k u ovom momentu. MITRE ATT&CK projekat navodi tehniku napada kao T1499. Proglašeno je za nije definisano. Kao 0-day, procenjena podzemna cena iznosila je oko $0-$5k. Zakrpa je dostupna za preuzimanje na git.kernel.org. Preporučuje se instalacija zakrpe radi otklanjanja ovog problema. Ova ranjivost je zabeležena i u drugim bazama podataka o ranjivostima: Tenable (236648). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

4 Promene · 79 Tačke podataka

PoljeKreirali
10/16/2022 10:22
Ažurira 1/3
11/09/2022 13:52
Ažurira 2/3
11/09/2022 13:58
Ažurira 3/3
05/18/2025 21:54
software_vendorLinuxLinuxLinuxLinux
software_nameKernelKernelKernelKernel
software_componentIPv6 HandlerIPv6 HandlerIPv6 HandlerIPv6 Handler
software_functionipv6_renew_optionsipv6_renew_optionsipv6_renew_optionsipv6_renew_options
vulnerability_cweCWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)CWE-401 (Uskraćivanje usluge)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prLLLL
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iNNNN
cvss3_vuldb_aLLLL
cvss3_vuldb_rlOOOO
cvss3_vuldb_rcCCCC
advisory_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
countermeasure_nameZakrpaZakrpaZakrpaZakrpa
countermeasure_patch_urlhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
source_cveCVE-2022-3524CVE-2022-3524CVE-2022-3524CVE-2022-3524
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1665871200 (10/16/2022)1665871200 (10/16/2022)1665871200 (10/16/2022)1665871200 (10/16/2022)
software_typeOperating SystemOperating SystemOperating SystemOperating System
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiPPPP
cvss2_vuldb_rcCCCC
cvss2_vuldb_rlOFOFOFOF
cvss2_vuldb_auSSSS
cvss2_vuldb_eNDNDNDND
cvss3_vuldb_eXXXX
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.53.53.53.5
cvss3_vuldb_basescore4.34.34.34.3
cvss3_vuldb_tempscore4.14.14.14.1
cvss3_meta_basescore4.34.35.45.4
cvss3_meta_tempscore4.14.15.35.3
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_assigned1665871200 (10/16/2022)1665871200 (10/16/2022)1665871200 (10/16/2022)
cve_nvd_summaryA vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prNN
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cve_cnaVulDBVulDB
cvss3_nvd_basescore7.57.5
cvss3_cna_basescore4.34.3
nessus_id236648
nessus_nameAlibaba Cloud Linux 3 : 0002: cloud-kernel bugfix, enhancement and (ALINUX3-SA-2023:0002)
cvss4_vuldb_avN
cvss4_vuldb_acL
cvss4_vuldb_prL
cvss4_vuldb_uiN
cvss4_vuldb_vcN
cvss4_vuldb_viN
cvss4_vuldb_vaL
cvss4_vuldb_eX
cvss4_vuldb_atN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss4_vuldb_bscore5.3
cvss4_vuldb_btscore5.3

Do you need the next level of professionalism?

Upgrade your account now!