Skip to main content

CVE-2022-23219: n/a in n/a

Critical
VulnerabilityCVE-2022-23219cvecve-2022-23219
Published: Fri Jan 14 2022 (01/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

AI-Powered Analysis

AILast updated: 07/03/2025, 11:24:47 UTC

Technical Analysis

CVE-2022-23219 is a critical security vulnerability found in the deprecated compatibility function clnt_create within the sunrpc module of the GNU C Library (glibc) up to version 2.34. The vulnerability arises because clnt_create copies its hostname argument onto the stack without validating the length of the input. This unchecked copying can lead to a classic stack-based buffer overflow (CWE-120). Exploiting this flaw could allow an attacker to cause a denial of service (DoS) by crashing the affected application or, more severely, achieve arbitrary code execution if the target application is compiled without stack protection mechanisms such as stack canaries. The vulnerability is remotely exploitable (AV:N) without any authentication (PR:N) or user interaction (UI:N), making it highly dangerous. The impact affects confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity. Although no known exploits are reported in the wild, the ease of exploitation and the severity of potential impact make it a significant threat. The vulnerability affects systems using glibc versions up to 2.34 that utilize the sunrpc module and the clnt_create function, which is often used in remote procedure call (RPC) implementations. Since glibc is a core component of most Linux distributions, this vulnerability has broad implications across many Linux-based environments.

Potential Impact

For European organizations, the impact of CVE-2022-23219 can be substantial. Many enterprises, government agencies, and critical infrastructure providers in Europe rely heavily on Linux-based systems that include glibc. The vulnerability could be exploited to disrupt services through denial of service attacks or to gain unauthorized control over systems, potentially leading to data breaches, espionage, or sabotage. Sectors such as finance, telecommunications, healthcare, and energy, which often use RPC services for internal and external communications, are particularly at risk. The ability to execute arbitrary code remotely without authentication increases the risk of widespread exploitation, especially in environments where legacy applications or outdated glibc versions are still in use. Additionally, the lack of user interaction requirement means automated attacks could be launched at scale. This could impact the confidentiality of sensitive data, the integrity of critical systems, and the availability of essential services, thereby affecting business continuity and regulatory compliance under frameworks like GDPR.

Mitigation Recommendations

To mitigate CVE-2022-23219, European organizations should take the following specific actions: 1) Immediately identify all systems running glibc versions up to 2.34, focusing on those that use the sunrpc module and the clnt_create function. 2) Apply official patches or upgrade glibc to versions beyond 2.34 where the vulnerability is fixed. If patches are not yet available, consider disabling or restricting the use of sunrpc services where feasible. 3) Rebuild critical applications with stack protection enabled (e.g., using compiler flags like -fstack-protector-strong) to reduce the risk of arbitrary code execution. 4) Implement network-level controls such as firewall rules to limit access to RPC services only to trusted hosts and networks, reducing the attack surface. 5) Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, including anomalous RPC calls or crashes. 6) Conduct vulnerability scans and penetration tests focused on RPC services to proactively identify exposure. 7) Educate system administrators and developers about the risks of using deprecated functions and the importance of input validation and secure coding practices. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and its operational context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-01-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbff3

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/3/2025, 11:24:47 AM

Last updated: 7/28/2025, 10:59:11 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats