Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-39180

Опубликовано: 10 июн. 2024
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

Отчет

No Red Hat products are affected by this CVE, as the ksmbd code is not included in any shipping RHEL kernel release.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2326531kernel: ksmbd: Read Request Memory Leak Denial-of-Service Vulnerability

EPSS

Процентиль: 19%
0.00059
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4
ubuntu
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
nvd
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
debian
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kern ...

CVSS3: 4
github
около 1 года назад

A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.

CVSS3: 4
fstec
больше 2 лет назад

Уязвимость функции smb2_read() модуля fs/smb/server/smb2pdu.c подсистемы SMB ядра операционной системы Linux, позволяющая удаленному нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 19%
0.00059
Низкий

4 Medium

CVSS3