-

CVE-2023-54250

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: avoid out of bounds access in decode_preauth_ctxt()

Confirm that the accessed pneg_ctxt->HashAlgorithms address sits within
the SMB request boundary; deassemble_neg_contexts() only checks that the
eight byte smb2_neg_context header + (client controlled) DataLength are
within the packet boundary, which is insufficient.

Checking for sizeof(struct smb2_preauth_neg_context) is overkill given
that the type currently assumes SMB311_SALT_SIZE bytes of trailing Salt.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 39f5b4b313b445c980a2a295bed28228c29228ed
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Status affected
Version < a2f6ded41bec1d3be643c80a5eb97f1680309001
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Status affected
Version < f02edb9debbd36f44efa7567031485892c7df60d
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Status affected
Version < e7067a446264a7514fa1cfaa4052cdb6803bc6a2
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.15
Status affected
Version < 5.15
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.145
Status unaffected
Version <= 6.1.*
Version 6.1.25
Status unaffected
Version <= 6.2.*
Version 6.2.12
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.063
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.