Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-3843

Опубликовано: 08 июн. 2007
Источник: redhat
EPSS Низкий

Описание

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

Отчет

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=275901CIFS signing sec= mount options don't work correctly

EPSS

Процентиль: 82%
0.0178
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

nvd
почти 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

debian
почти 18 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable fo ...

github
около 3 лет назад

The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.

oracle-oval
почти 18 лет назад

ELSA-2007-0705: Important: kernel security update (IMPORTANT)

EPSS

Процентиль: 82%
0.0178
Низкий