Lucene search

K
zdiAlex BirnbergZDI-24-297
HistoryMar 28, 2024 - 12:00 a.m.

Linux Kernel nft_exthdr_sctp_eval Stack-based Buffer Overflow Information Disclosure Vulnerability

2024-03-2800:00:00
Alex Birnberg
www.zerodayinitiative.com
13
vulnerability disclosure installation attacker code execution kernel context lack of validation user-supplied data buffer overflow

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

16.0%

This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_exthdr_sctp_eval function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel.