add data/KernelPocs/CVE-2023-0179/CVE-2023-0179.yaml.

Signed-off-by: Cage <wangjiaming2022@buaa.edu.cn>
This commit is contained in:
Cage 2023-03-09 04:26:32 +00:00 committed by Gitee
parent 736cbe5297
commit 28ffc1d681
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
1 changed files with 24 additions and 0 deletions

View File

@ -0,0 +1,24 @@
FormatVer: 20230309
Id: CVE-2023-0179
Belong: kernel
PocHazardLevel: Medium
Source: https://github.com/TurtleARM/CVE-2023-0179-PoC
SiteInfo:
Name: Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核
Severity: high
Description:
Linux Kernel nftables 存在整数溢出漏洞该漏洞是由于nft_payload_copy_vlan函数的ethlen变量计算不正确经过身份验证的攻击者可以利用该漏洞将本地权限提升至ROOT权限。
ScopeOfInfluence:
v5.5-rc1 <= Linux Kernel <= v6.2-rc4
References:
- https://www.openwall.com/lists/oss-security/2023/01/13/2
- https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230111212251.193032-4-pablo@netfilter.org/
SiteClassification:
CvssMetrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CvssScore: 7.8
CveId: CVE-2023-0179
CweId: CWE-190
CnvdId: None
KveId: None
Tags:
- 权限提升