CVE-2022-2469
low-risk
Published 2022-07-19
GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.8/10
Low
NETWORK
/ LOW complexity
Affected Products (3)
References (6)
Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2469.json
Third Party Advisory
https://www.debian.org/security/2022/dsa-5189
Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2469.json
Third Party Advisory
https://www.debian.org/security/2022/dsa-5189
26
/ 100
low-risk
Severity
17/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
9/34 · Low