CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
A vulnerability in the AIX SMB client daemon could allow a non-privileged local user to cause a denial of service (CVE-2023-45165). AIX uses the SMB client daemon to access files on SMB servers.
CVEID:CVE-2023-45165
**DESCRIPTION:**IBM AIX could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/267963 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Affected Product(s) | Version(s) |
---|---|
AIX | 7.2 |
AIX | 7.3 |
The following fileset levels are vulnerable:
Fileset | Lower Level | Upper Level |
---|---|---|
smbc.rte | 7.2.0.0 | 7.2.302.10 |
To determine if your system is vulnerable, execute the following commands:
lslpp -L | grep -i smbc.rte
FIXES
IBM strongly recommends addressing the vulnerability now.
The latest SMB client fileset may be downloaded from:
<https://www.ibm.com/resources/mrs/assets?source=aixbp>
To extract the fixes from the tar file:
For AIX 7.2 and 7.3 TL0:
gunzip smbc_302_fileset_72.tar.gz | tar xvf
For AIX 7.3 TL1:
gunzip smbc_302_fileset_73.tar.gz | tar xvf
IMPORTANT: If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.
To preview the fix installation:
installp -apYd . smbc
To install the fix package:
installp -aXYd . smbc
None
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%