Skip to main content

CVE-2022-23218: n/a in n/a

Critical
VulnerabilityCVE-2022-23218cvecve-2022-23218
Published: Fri Jan 14 2022 (01/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

AI-Powered Analysis

AILast updated: 07/03/2025, 11:24:33 UTC

Technical Analysis

CVE-2022-23218 is a critical vulnerability in the GNU C Library (glibc), specifically within the deprecated compatibility function svcunix_create in the sunrpc module. This function copies its path argument onto the stack without validating the length of the input, leading to a classic stack-based buffer overflow (CWE-120). Because the function does not perform bounds checking, an attacker can supply an overly long path argument, causing memory corruption. The consequences of this vulnerability include denial of service (DoS) due to application crashes or, more severely, arbitrary code execution if the affected application is not compiled with stack protection mechanisms such as stack canaries. The vulnerability affects glibc versions up to and including 2.34. Exploitation requires no authentication or user interaction and can be triggered remotely if the vulnerable function is exposed via network services using sunrpc. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. While no known exploits are currently reported in the wild, the high severity and ease of exploitation make this a significant threat to systems relying on vulnerable glibc versions, especially those exposing sunrpc services or legacy RPC-based applications.

Potential Impact

For European organizations, the impact of CVE-2022-23218 can be substantial. Many Linux-based servers and embedded systems in Europe use glibc as the standard C library, and some legacy or specialized applications may still rely on the sunrpc module and its compatibility functions. Exploitation could lead to service outages (DoS) affecting critical infrastructure, financial services, telecommunications, and government systems. More critically, arbitrary code execution could allow attackers to gain full control over affected systems, leading to data breaches, lateral movement within networks, and persistent footholds. Given the widespread use of Linux in European data centers and cloud environments, this vulnerability poses a risk to both private and public sectors. The absence of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation in targeted or opportunistic attacks.

Mitigation Recommendations

To mitigate CVE-2022-23218, European organizations should prioritize the following actions: 1) Immediately update glibc to a patched version beyond 2.34 where this vulnerability is fixed. Since no patch links are provided in the source, organizations should monitor official GNU and Linux distribution security advisories for updates. 2) Audit and disable any legacy or deprecated sunrpc services that rely on svcunix_create, especially if they are exposed to untrusted networks. 3) Rebuild critical applications with stack protection enabled (e.g., using compiler flags like -fstack-protector-strong) to reduce the risk of arbitrary code execution. 4) Employ network-level controls such as firewall rules to restrict access to RPC services only to trusted hosts. 5) Implement runtime protections like Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation impact. 6) Conduct vulnerability scanning and penetration testing focused on sunrpc-related services to identify potential exposure. 7) Maintain robust incident detection capabilities to identify anomalous behavior indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-01-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbff1

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/3/2025, 11:24:33 AM

Last updated: 8/11/2025, 11:11:42 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats