
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52442 is a vulnerability in the Linux kernel's ksmbd component that was discovered in 2023 and publicly disclosed on February 21, 2024. The vulnerability affects the validation of session IDs and tree IDs in compound requests within the SMB server implementation. The issue impacts Linux kernel versions from 5.15 through 6.4.16, as well as various release candidates of version 6.5 (NVD).
The vulnerability exists in the smb2_get_msg()
function within smb2getksmbdtcon() and smb2checkusersession() implementations. When processing compound requests, these functions would always return the first request SMB2 header instead of the current command. This becomes particularly problematic when SMB2_TREE_CONNECT_HE
is the first command in a compound request, as it results in the tree ID check being skipped. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability could potentially lead to system availability issues due to improper validation of session and tree IDs in compound requests. The CVSS scoring indicates that while the vulnerability requires local access and low privileges, it could result in high impact to system availability (NVD).
The vulnerability has been fixed in multiple Linux kernel versions: 5.15.145, 6.1.53, 6.4.16, and 6.5. The fix involves using ksmbdreqbuf_next() to get the current command in compound requests instead of relying on the first request header. Various Linux distributions have released patches, including Ubuntu which has fixed the issue in multiple kernel packages (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."