The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3680f78981d26c078a26e5c748531257ebb - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/103378 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1539599 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebb - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://patchwork.kernel.org/patch/10187633/ - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3880-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3880-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4187 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4188 - Third Party Advisory |
Information
Published : 2018-03-02 08:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1066
Mitre link : CVE-2018-1066
CVE.ORG link : CVE-2018-1066
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-476
NULL Pointer Dereference