Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40099

Опубликовано: 30 окт. 2025
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: cifs: parse_dfs_referrals: prevent oob on malformed input Malicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS

  • reply smaller than sizeof(struct get_dfs_referral_rsp)
  • reply with number of referrals smaller than NumberOfReferrals in the header Processing of such replies will cause oob. Return -EINVAL error on such replies to prevent oob-s.

    A flaw was found in the Linux kernel's CIFS/SMB client implementation. In parse_dfs_referrals(), insufficient validation of server responses to FSCTL_DFS_GET_REFERRALS requests allows a malicious SMB server to send crafted replies that cause out-of-bounds memory access. Specifically, replies smaller than expected or with mismatched referral counts can trigger the vulnerability. A system connecting to a malicious or compromised SMB server could experience a kernel crash or memory corruption.

Отчет

This vulnerability requires connecting to a malicious SMB server. While the attack vector is network-adjacent (requires SMB mount), exploitation depends on the attacker controlling the server. The impact is denial of service through kernel crash.

Меры по смягчению последствий

To mitigate this issue, prevent the cifs module from being loaded if SMB/CIFS filesystem access is not required. See https://access.redhat.com/solutions/41278 for instructions on how to blacklist a kernel module.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-1288
https://bugzilla.redhat.com/show_bug.cgi?id=2407341kernel: cifs: parse_dfs_referrals: prevent oob on malformed input

EPSS

Процентиль: 13%
0.00041
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: cifs: parse_dfs_referrals: prevent oob on malformed input Malicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS - reply smaller than sizeof(struct get_dfs_referral_rsp) - reply with number of referrals smaller than NumberOfReferrals in the header Processing of such replies will cause oob. Return -EINVAL error on such replies to prevent oob-s.

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: cifs: parse_dfs_referrals: prevent oob on malformed input Malicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS - reply smaller than sizeof(struct get_dfs_referral_rsp) - reply with number of referrals smaller than NumberOfReferrals in the header Processing of such replies will cause oob. Return -EINVAL error on such replies to prevent oob-s.

CVSS3: 6.3
msrc
4 месяца назад

cifs: parse_dfs_referrals: prevent oob on malformed input

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: c ...

github
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: cifs: parse_dfs_referrals: prevent oob on malformed input Malicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS - reply smaller than sizeof(struct get_dfs_referral_rsp) - reply with number of referrals smaller than NumberOfReferrals in the header Processing of such replies will cause oob. Return -EINVAL error on such replies to prevent oob-s.

EPSS

Процентиль: 13%
0.00041
Низкий

5.5 Medium

CVSS3