First published: Fri Nov 15 2024(Updated: )
A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39176 is rated as a medium severity vulnerability due to its potential impact on system stability.
You can fix CVE-2023-39176 by applying the latest security patches provided by your Linux distribution.
CVE-2023-39176 can be exploited through specially crafted SMB2 requests to trigger a buffer read overflow.
CVE-2023-39176 affects specific versions of the Linux Kernel, primarily those with the ksmbd module implemented.
Exploiting CVE-2023-39176 could allow an attacker to read sensitive data beyond the allocated buffer, leading to information disclosure.