{ "id": "CVE-2022-23092", "sourceIdentifier": "secteam@freebsd.org", "published": "2024-02-15T06:15:45.190", "lastModified": "2025-06-04T22:09:43.293", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.\n\nThe bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox." }, { "lang": "es", "value": "A la implementaci\u00f3n del manejo de mensajes RWALK por parte de lib9p le faltaba una verificaci\u00f3n de los l\u00edmites necesaria al descomprimir el contenido del mensaje. La verificaci\u00f3n faltante significa que la recepci\u00f3n de un mensaje especialmente manipulado har\u00e1 que lib9p sobrescriba la memoria no relacionada. El error puede ser provocado por un kernel invitado de bhyve malicioso que sobrescribe la memoria en el proceso bhyve(8). Esto podr\u00eda conducir potencialmente a la ejecuci\u00f3n de c\u00f3digo en modo de usuario en el host, sujeto al entorno limitado de Capsicum de bhyve." } ], "metrics": { "cvssMetricV31": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-787" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "7412DBD8-BB1F-48A8-AAE1-BA5C8D7BDDF7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "833DFF5B-BC50-424A-ABCF-EC632F421B76" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "9F27016E-4117-4094-BB7A-9C56E38024D9" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:beta3-p1:*:*:*:*:*:*", "matchCriteriaId": "EC7326E3-908D-47A1-B848-3AA7F34B3DD3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "B149BF69-951D-47B4-996C-9E4773DA75B7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p1:*:*:*:*:*:*", "matchCriteriaId": "04A0E266-714C-4753-A652-A51F25582C78" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p10:*:*:*:*:*:*", "matchCriteriaId": "D133E8E0-4E88-451C-9693-5DE5C3092AD2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p11:*:*:*:*:*:*", "matchCriteriaId": "FF1A096F-EC60-4C7D-AE40-D1DDAC9D4E40" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p2:*:*:*:*:*:*", "matchCriteriaId": "556111A1-C236-4DF6-9438-F9C874451A58" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p3:*:*:*:*:*:*", "matchCriteriaId": "1673F16B-463A-492C-B66F-48917008F7F5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p4:*:*:*:*:*:*", "matchCriteriaId": "E73B211F-2CA9-47A4-B318-F24CC1C7E589" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p5:*:*:*:*:*:*", "matchCriteriaId": "7C13DDEF-FF5F-4723-9C25-4EA66AE2CEDD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p6:*:*:*:*:*:*", "matchCriteriaId": "7A942EA9-0DD3-44BC-B582-C680BA34E88F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p7:*:*:*:*:*:*", "matchCriteriaId": "689BC10B-0404-4468-B604-9D96337F9BD1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p8:*:*:*:*:*:*", "matchCriteriaId": "38DDAA43-3E9C-479F-8416-E3B9BE23C31B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:p9:*:*:*:*:*:*", "matchCriteriaId": "AE490480-1EA1-4684-A643-9749E87A8448" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC271C93-EB83-4301-B7BA-F3249B71B1EA" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "04329338-AC28-4A74-BE6B-CE8EC6CC37B7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "ADBA841F-5C83-4759-84B7-B59DA1B12EA8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "6A8F38B3-A6DA-4178-A2BD-0D4F0267C384" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "9BB028A0-70F6-42DA-9E5A-F7AAF74ED45B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.0:rc5-p1:*:*:*:*:*:*", "matchCriteriaId": "00D28E4E-022B-482E-9952-7F7F47C427C2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*", "matchCriteriaId": "66364EA4-83B1-4597-8C18-D5633B361A9C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*", "matchCriteriaId": "EF9292DD-EFB1-4B50-A941-7485D901489F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*", "matchCriteriaId": "B536EE52-ED49-4A85-BC9D-A27828D5A961" } ] } ] } ], "references": [ { "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:12.lib9p.asc", "source": "secteam@freebsd.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20240415-0009/", "source": "secteam@freebsd.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://security.freebsd.org/advisories/FreeBSD-SA-22:12.lib9p.asc", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20240415-0009/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }