Vulnerability Name: | CVE-2022-2663 (CCN-234857) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-08-30 | ||||||||||||||||||||||||||||||||
Published: | 2022-08-30 | ||||||||||||||||||||||||||||||||
Updated: | 2023-02-12 | ||||||||||||||||||||||||||||||||
Summary: | Linux Kernel could allow a remote attacker to bypass security restrictions, caused by an issue in nf_conntrack_irc. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass firewall. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2663 Source: secalert@redhat.com Type: Exploit, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN linux-kernel-cve20222663-sec-bypass(234857) Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Lore Kernel Web site [PATCH 1/2] netfilter: nf_conntrack_irc: Tighten matching on DCC message Source: CCN Type: oss-sec Mailing List, Tue, 30 Aug 2022 12:27:44 +1000 CVE-2022-2663: Linux netfilter: nf_conntrack_irc message handling Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: Mend Vulnerability Database CVE-2022-2663 Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Exploit, Third Party Advisory secalert@redhat.com | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |