CVE-2022-23219: n/a in n/a
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
AI Analysis
Technical Summary
CVE-2022-23219 is a critical security vulnerability found in the deprecated compatibility function clnt_create within the sunrpc module of the GNU C Library (glibc) up to version 2.34. The vulnerability arises because clnt_create copies its hostname argument onto the stack without validating the length of the input. This unchecked copying can lead to a classic stack-based buffer overflow (CWE-120). Exploiting this flaw could allow an attacker to cause a denial of service (DoS) by crashing the affected application or, more severely, achieve arbitrary code execution if the target application is compiled without stack protection mechanisms such as stack canaries. The vulnerability is remotely exploitable (AV:N) without any authentication (PR:N) or user interaction (UI:N), making it highly dangerous. The impact affects confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity. Although no known exploits are reported in the wild, the ease of exploitation and the severity of potential impact make it a significant threat. The vulnerability affects systems using glibc versions up to 2.34 that utilize the sunrpc module and the clnt_create function, which is often used in remote procedure call (RPC) implementations. Since glibc is a core component of most Linux distributions, this vulnerability has broad implications across many Linux-based environments.
Potential Impact
For European organizations, the impact of CVE-2022-23219 can be substantial. Many enterprises, government agencies, and critical infrastructure providers in Europe rely heavily on Linux-based systems that include glibc. The vulnerability could be exploited to disrupt services through denial of service attacks or to gain unauthorized control over systems, potentially leading to data breaches, espionage, or sabotage. Sectors such as finance, telecommunications, healthcare, and energy, which often use RPC services for internal and external communications, are particularly at risk. The ability to execute arbitrary code remotely without authentication increases the risk of widespread exploitation, especially in environments where legacy applications or outdated glibc versions are still in use. Additionally, the lack of user interaction requirement means automated attacks could be launched at scale. This could impact the confidentiality of sensitive data, the integrity of critical systems, and the availability of essential services, thereby affecting business continuity and regulatory compliance under frameworks like GDPR.
Mitigation Recommendations
To mitigate CVE-2022-23219, European organizations should take the following specific actions: 1) Immediately identify all systems running glibc versions up to 2.34, focusing on those that use the sunrpc module and the clnt_create function. 2) Apply official patches or upgrade glibc to versions beyond 2.34 where the vulnerability is fixed. If patches are not yet available, consider disabling or restricting the use of sunrpc services where feasible. 3) Rebuild critical applications with stack protection enabled (e.g., using compiler flags like -fstack-protector-strong) to reduce the risk of arbitrary code execution. 4) Implement network-level controls such as firewall rules to limit access to RPC services only to trusted hosts and networks, reducing the attack surface. 5) Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, including anomalous RPC calls or crashes. 6) Conduct vulnerability scans and penetration tests focused on RPC services to proactively identify exposure. 7) Educate system administrators and developers about the risks of using deprecated functions and the importance of input validation and secure coding practices. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and its operational context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2022-23219: n/a in n/a
Description
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2022-23219 is a critical security vulnerability found in the deprecated compatibility function clnt_create within the sunrpc module of the GNU C Library (glibc) up to version 2.34. The vulnerability arises because clnt_create copies its hostname argument onto the stack without validating the length of the input. This unchecked copying can lead to a classic stack-based buffer overflow (CWE-120). Exploiting this flaw could allow an attacker to cause a denial of service (DoS) by crashing the affected application or, more severely, achieve arbitrary code execution if the target application is compiled without stack protection mechanisms such as stack canaries. The vulnerability is remotely exploitable (AV:N) without any authentication (PR:N) or user interaction (UI:N), making it highly dangerous. The impact affects confidentiality, integrity, and availability, as arbitrary code execution could lead to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity. Although no known exploits are reported in the wild, the ease of exploitation and the severity of potential impact make it a significant threat. The vulnerability affects systems using glibc versions up to 2.34 that utilize the sunrpc module and the clnt_create function, which is often used in remote procedure call (RPC) implementations. Since glibc is a core component of most Linux distributions, this vulnerability has broad implications across many Linux-based environments.
Potential Impact
For European organizations, the impact of CVE-2022-23219 can be substantial. Many enterprises, government agencies, and critical infrastructure providers in Europe rely heavily on Linux-based systems that include glibc. The vulnerability could be exploited to disrupt services through denial of service attacks or to gain unauthorized control over systems, potentially leading to data breaches, espionage, or sabotage. Sectors such as finance, telecommunications, healthcare, and energy, which often use RPC services for internal and external communications, are particularly at risk. The ability to execute arbitrary code remotely without authentication increases the risk of widespread exploitation, especially in environments where legacy applications or outdated glibc versions are still in use. Additionally, the lack of user interaction requirement means automated attacks could be launched at scale. This could impact the confidentiality of sensitive data, the integrity of critical systems, and the availability of essential services, thereby affecting business continuity and regulatory compliance under frameworks like GDPR.
Mitigation Recommendations
To mitigate CVE-2022-23219, European organizations should take the following specific actions: 1) Immediately identify all systems running glibc versions up to 2.34, focusing on those that use the sunrpc module and the clnt_create function. 2) Apply official patches or upgrade glibc to versions beyond 2.34 where the vulnerability is fixed. If patches are not yet available, consider disabling or restricting the use of sunrpc services where feasible. 3) Rebuild critical applications with stack protection enabled (e.g., using compiler flags like -fstack-protector-strong) to reduce the risk of arbitrary code execution. 4) Implement network-level controls such as firewall rules to limit access to RPC services only to trusted hosts and networks, reducing the attack surface. 5) Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, including anomalous RPC calls or crashes. 6) Conduct vulnerability scans and penetration tests focused on RPC services to proactively identify exposure. 7) Educate system administrators and developers about the risks of using deprecated functions and the importance of input validation and secure coding practices. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and its operational context.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-01-14T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbff3
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/3/2025, 11:24:47 AM
Last updated: 2/7/2026, 8:46:01 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.