Release Date: | 2018-03-02 |
The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
See more information about CVE-2018-1066 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
Base Score: | 6.5 | Base Metrics: | AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Access Vector: | Network | Attack Complexity: | Low |
Privileges Required: | None | User Interaction: | Required |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 6 (kernel-uek) | ELSA-2019-4596 | 2019-03-31 |
Oracle Linux version 7 (kernel-uek) | ELSA-2019-4596 | 2019-03-31 |
Oracle VM version 3.4 (kernel-uek) | OVMSA-2019-0014 | 2019-05-02 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team