Buffer Overflow Vulnerability in Linux Kernel's Netfilter Subsystem Could Lead to Local Privilege Escalation
CVE-2023-0179
Key Information:
- Vendor
- Linux
- Status
- kernel
- Vendor
- CVE Published:
- 27 March 2023
Badges
Summary
There is a critical vulnerability in the Linux Kernel's Netfilter subsystem, with the tracking number CVE-2023-0179. This is a stack-based buffer overflow vulnerability that could lead to local privilege escalation, potentially allowing an attacker to gain root privileges. The vulnerability affects Linux kernel 6.2.0-rc1 and can be exploited to leak both stack and heap addresses, making it a serious security flaw. Users are advised to update their Linux servers immediately and apply any available patches, as well as disable unprivileged user namespaces to prevent exploitation. The potential impact of this vulnerability is significant, and it has been exploited in the wild, although ransomware groups have not been specifically linked to these incidents.
Affected Version(s)
kernel unknown
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
BLOG: Patching The Reserved - Highly Exploitable Kernel Bugs in Purgatory - Orpheus Cyber
Written by Femke Bolle & Alex Ashby The CVE release and NVD CVSS severity scoring processes have well-established latency issues, with CVEs sometimes taking months to be published and scored. This presents a significant threat to any vulnerability management strategy reliant on the NVD and MITRE. T...
7 months ago
Ethical Hacking - CVE-2023-0179: A Buffer Overflow Vulnerability in the Linux Kernel
A buffer overflow vulnerability was recently discovered in the Netfilter subsystem of the Linux kernel. This vulnerability, tracked as CVE-2023-0179, could allow a local attacker to gain root privileges on the affected system.
7 months ago
Top Trending CVEs of January 2023 | NopSec
Roll up your sleeves and drop to a command line as we cover some of January’s trendiest vulnerabilities. Read more to help your organization stay secure.
7 months ago
References
CVSS V3.1
Timeline
- 📰
First article discovered by betrusted.it
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved