Use-After-Free Vulnerability in Linux Kernel's Netfilter Subsystem
CVE-2023-3390
7.8HIGH
Key Information
- Vendor
- Linux
- Status
- Linux Kernel
- Vendor
- CVE Published:
- 28 June 2023
Badges
👾 Exploit Exists🔴 Public PoC
Summary
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.
Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
Affected Version(s)
Linux Kernel < 6.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Refferences
https://git.kernel.org/pub/scm/linux/kernel/git/stable/li...
https://kernel.dance/1240eb93f0616b21c675416516ff3d74798f...
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5461
https://lists.debian.org/debian-lts-announce/2023/08/msg0...
https://security.netapp.com/advisory/ntap-20230818-0004/
http://packetstormsecurity.com/files/174577/Kernel-Live-P...
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 🔴
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)