9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
73.3%
A flaw was found in the Linux kernel’s ksmbd, a high-performance in-kernel
SMB server. The specific flaw exists within the processing of
SMB2_SESSION_SETUP commands. The issue results from the lack of proper
locking when performing operations on an object. An attacker can leverage
this vulnerability to execute code in the context of the kernel.
Author | Note |
---|---|
rodrigo-zaiden | needs ksmbd-tools installed to enable the service, which is not installed by default. same fix as CVE-2023-32252, CVE-2023-32257 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < 5.15.0-94.104 | UNKNOWN |
ubuntu | 23.04 | noarch | linux | < 6.2.0-32.32 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1053.58 | UNKNOWN |
ubuntu | 23.04 | noarch | linux-aws | < 6.2.0-1011.11 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1053.58~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.2 | < 6.2.0-1011.11~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1056.64 | UNKNOWN |
ubuntu | 23.04 | noarch | linux-azure | < 6.2.0-1011.11 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < 5.15.0-1056.64~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < 5.15.0-1056.64.1 | UNKNOWN |
git.kernel.org/linus/f5c779b7ddbda30866cf2a27c63e34158f858c73 (6.4-rc1)
launchpad.net/bugs/cve/CVE-2023-32250
nvd.nist.gov/vuln/detail/CVE-2023-32250
security-tracker.debian.org/tracker/CVE-2023-32250
ubuntu.com/security/notices/USN-6173-1
ubuntu.com/security/notices/USN-6338-1
ubuntu.com/security/notices/USN-6338-2
ubuntu.com/security/notices/USN-6344-1
ubuntu.com/security/notices/USN-6626-1
ubuntu.com/security/notices/USN-6626-2
ubuntu.com/security/notices/USN-6626-3
ubuntu.com/security/notices/USN-6628-1
ubuntu.com/security/notices/USN-6628-2
www.cve.org/CVERecord?id=CVE-2023-32250
www.zerodayinitiative.com/advisories/ZDI-23-698/