Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2022-48837 First vendor Publication 2024-07-16
Vendor Cve Last vendor Modification 2024-07-18

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: rndis: prevent integer overflow in rndis_set_response()

If "BufOffset" is very large the "BufOffset + 8" operation can have an integer overflow.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-190 Integer Overflow or Wraparound (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3463

Sources (Detail)

https://git.kernel.org/stable/c/138d4f739b35dfb40438a0d5d7054965763bfbe7
https://git.kernel.org/stable/c/21829376268397f9fd2c35cfa9135937b6aa3a1e
https://git.kernel.org/stable/c/28bc0267399f42f987916a7174e2e32f0833cc65
https://git.kernel.org/stable/c/56b38e3ca4064041d93c1ca18828c8cedad2e16c
https://git.kernel.org/stable/c/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa
https://git.kernel.org/stable/c/8b3e4d26bc9cd0f6373d0095b9ffd99e7da8006b
https://git.kernel.org/stable/c/c7953cf03a26876d676145ce5d2ae6d8c9630b90
https://git.kernel.org/stable/c/df7e088d51cdf78b1a0bf1f3d405c2593295c7b0
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2024-08-22 02:35:02
  • Multiple Updates
2024-08-02 13:43:18
  • Multiple Updates
2024-08-02 01:31:19
  • Multiple Updates
2024-07-18 21:27:40
  • Multiple Updates
2024-07-16 17:27:24
  • First insertion