Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xmg2-6455-627q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

EPSS

Процентиль: 82%
0.0178
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

redhat
около 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

nvd
почти 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

debian
почти 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable fo ...

oracle-oval
почти 18 лет назад

ELSA-2007-0705: Important: kernel security update (IMPORTANT)

EPSS

Процентиль: 82%
0.0178
Низкий