
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-39179) was discovered in the Linux kernel's ksmbd module, specifically in the handling of SMB2 read requests. The vulnerability was reported on July 18, 2023, and affects Linux systems with ksmbd enabled. The issue stems from improper validation of user-supplied data in SMB2 read requests, resulting in an out-of-bounds read vulnerability (ZDI Advisory, NVD).
The vulnerability is classified as an out-of-bounds read (CWE-125) with a CVSS v3.1 base score of 7.5 (High). The attack vector is network-based (AV:N) with high attack complexity (AC:H), requiring no privileges (PR:N) or user interaction (UI:N). The scope is changed (S:C) with high confidentiality impact (C:H), no integrity impact (I:N), and low availability impact (A:L) (ZDI Advisory, Red Hat).
The vulnerability allows remote attackers to disclose sensitive information on affected Linux installations. An attacker can leverage this vulnerability to read past the end of an allocated buffer, potentially exposing sensitive system information. The impact is limited to systems with the ksmbd module enabled (ZDI Advisory).
Linux has issued an update to correct this vulnerability. The fix can be found in the kernel patch submitted to the Linux kernel mailing list. For systems that cannot immediately apply the patch, ensuring the ksmbd module is disabled would prevent exploitation (ZDI Advisory, Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."