← Volver a CVEs
CVE-2018-1066
N/ADescripcion
The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/2/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
canonical:ubuntu_linuxdebian:debian_linuxlinux:linux_kernel
Debilidades (CWE)
CWE-476
Referencias
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3680f78981d26c078a26e5c748531257ebb(secalert@redhat.com)
http://www.securityfocus.com/bid/103378(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1539599(secalert@redhat.com)
https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebb(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html(secalert@redhat.com)
https://patchwork.kernel.org/patch/10187633/(secalert@redhat.com)
https://usn.ubuntu.com/3880-1/(secalert@redhat.com)
https://usn.ubuntu.com/3880-2/(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4187(secalert@redhat.com)
https://www.debian.org/security/2018/dsa-4188(secalert@redhat.com)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3680f78981d26c078a26e5c748531257ebb(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/103378(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1539599(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebb(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
https://patchwork.kernel.org/patch/10187633/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3880-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3880-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4187(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4188(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.