Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39180

Опубликовано: 18 нояб. 2024
Источник: debian
EPSS Низкий

Описание

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.5.3-1package
linuxfixed6.1.55-1bookwormpackage
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/e202a1e8634b186da38cbbff85382ea2b9e297cf (6.5-rc4)

EPSS

Процентиль: 19%
0.00059
Низкий

Связанные уязвимости

CVSS3: 4
ubuntu
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
redhat
больше 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
nvd
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
github
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
fstec
больше 2 лет назад

Уязвимость функции smb2_read() модуля fs/smb/server/smb2pdu.c подсистемы SMB ядра операционной системы Linux, позволяющая удаленному нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 19%
0.00059
Низкий