Executive Summary

Informations
Name CVE-2023-1390 First vendor Publication 2023-03-16
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 7.5
Base Score 7.5 Environmental Score 7.5
impact SubScore 3.6 Temporal Score 7.5
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1390

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 3411

Sources (Detail)

https://infosec.exchange/%40_mattata/109427999461122360
Source Url
CONFIRM https://security.netapp.com/advisory/ntap-20230420-0001/
MISC https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5
https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-03-12 13:32:57
  • Multiple Updates
2024-02-02 02:41:40
  • Multiple Updates
2024-02-01 12:28:50
  • Multiple Updates
2023-12-29 02:31:19
  • Multiple Updates
2023-11-22 02:30:36
  • Multiple Updates
2023-11-07 21:29:43
  • Multiple Updates
2023-09-29 13:25:03
  • Multiple Updates
2023-09-05 13:37:34
  • Multiple Updates
2023-09-05 01:28:11
  • Multiple Updates
2023-09-02 13:35:17
  • Multiple Updates
2023-09-02 01:28:39
  • Multiple Updates
2023-08-12 13:41:22
  • Multiple Updates
2023-08-12 01:27:55
  • Multiple Updates
2023-08-11 13:32:20
  • Multiple Updates
2023-08-11 01:28:46
  • Multiple Updates
2023-08-06 13:29:47
  • Multiple Updates
2023-08-06 01:27:34
  • Multiple Updates
2023-08-04 13:30:16
  • Multiple Updates
2023-08-04 01:27:57
  • Multiple Updates
2023-07-14 13:30:10
  • Multiple Updates
2023-07-14 01:27:37
  • Multiple Updates
2023-06-07 17:27:38
  • Multiple Updates
2023-06-06 13:19:21
  • Multiple Updates
2023-04-20 13:27:35
  • Multiple Updates
2023-04-13 02:16:27
  • Multiple Updates
2023-03-28 13:27:24
  • Multiple Updates
2023-03-28 12:27:37
  • Multiple Updates
2023-03-24 17:27:22
  • Multiple Updates
2023-03-17 09:27:17
  • Multiple Updates
2023-03-17 00:27:19
  • First insertion