
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel before version 6.3.8, identified as CVE-2023-38431. The issue exists in fs/smb/server/connection.c where the ksmbd component fails to properly validate the relationship between the NetBIOS header's length field and the SMB header sizes, specifically through pdusize in ksmbdconnhandlerloop, leading to an out-of-bounds read vulnerability (NVD, Ubuntu).
The vulnerability stems from improper validation of packet header sizes in the KSMBD implementation. If pdu_size is 0, ksmbd allocates a 4-byte chunk to conn->request_buf. When the function get_smb2_cmd_val attempts to read the command from rcv_hdr->Command (which is conn->request_buf + 12), it results in an out-of-bounds read. The length field of the NetBIOS header must be greater than the SMB header sizes (SMB1 or SMB2 header); otherwise, the packet is considered invalid. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.1 (CRITICAL) with the vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H (Kernel Patch).
A successful exploitation of this vulnerability could allow a remote attacker to cause a denial of service (system crash) or potentially expose sensitive information. The vulnerability affects systems running Linux kernel versions prior to 6.3.8 that have the KSMBD feature enabled (Ubuntu, NetApp Advisory).
The vulnerability has been fixed in Linux kernel version 6.3.8. The fix includes adding proper validation checks for the pdusize in ksmbdconnhandlerloop to ensure it is greater than the minimum supported header size for both SMB1 and SMB2 protocols. Users are advised to upgrade to Linux kernel version 6.3.8 or later to address this vulnerability (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."