Intel Trace Analyzer Stack Overflow <v2021.8.0 Escalation
CVE-2023-23569 Published on May 10, 2023

Stack-based buffer overflow for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable escalation of privilege via local access.

NVD

Vulnerability Analysis

CVE-2023-23569 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2023-23569 has been classified to as a Stack Overflow vulnerability or weakness.


Products Associated with CVE-2023-23569

stack.watch emails you whenever new vulnerabilities are published in Intel Trace Analyzer And Collector or Intel Oneapi Hpc Toolkit. Just hit a watch button to start following.

 
 

Exploit Probability

EPSS
0.13%
Percentile
32.58%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.