Buffer Overflow Vulnerability in Linux Kernel's Netfilter Subsystem Could Lead to Local Privilege Escalation
CVE-2023-0179

7.8HIGH

Key Information:

Vendor
Linux
Status
kernel
Vendor
CVE Published:
27 March 2023

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

There is a critical vulnerability in the Linux Kernel's Netfilter subsystem, with the tracking number CVE-2023-0179. This is a stack-based buffer overflow vulnerability that could lead to local privilege escalation, potentially allowing an attacker to gain root privileges. The vulnerability affects Linux kernel 6.2.0-rc1 and can be exploited to leak both stack and heap addresses, making it a serious security flaw. Users are advised to update their Linux servers immediately and apply any available patches, as well as disable unprivileged user namespaces to prevent exploitation. The potential impact of this vulnerability is significant, and it has been exploited in the wild, although ransomware groups have not been specifically linked to these incidents.

Affected Version(s)

kernel unknown

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

BLOG: Patching The Reserved - Highly Exploitable Kernel Bugs in Purgatory - Orpheus Cyber

Written by Femke Bolle & Alex Ashby The CVE release and NVD CVSS severity scoring processes have well-established latency issues, with CVEs sometimes taking months to be published and scored. This presents a significant threat to any vulnerability management strategy reliant on the NVD and MITRE.  T...

7 months ago

Ethical Hacking - CVE-2023-0179: A Buffer Overflow Vulnerability in the Linux Kernel

A buffer overflow vulnerability was recently discovered in the Netfilter subsystem of the Linux kernel. This vulnerability, tracked as CVE-2023-0179, could allow a local attacker to gain root privileges on the affected system.

7 months ago

Top Trending CVEs of January 2023 | NopSec

Roll up your sleeves and drop to a command line as we cover some of January’s trendiest vulnerabilities. Read more to help your organization stay secure.

7 months ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by betrusted.it

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database2 Proof of Concept(s)5 News Article(s)
.