ID |
CVE-2007-3843
|
Summary |
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.19:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.20:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.21:rc6:*:*:*:*:*:*
-
cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.22:rc6:*:*:*:*:*:*
|
CVSS |
Base: | 4.3 (as of 29-09-2017 - 01:29) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
oval
via4
|
accepted | 2013-04-29T04:21:13.460-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 5 | oval | oval:org.mitre.oval:def:11414 |
comment | The operating system installed on the system is CentOS Linux 5.x | oval | oval:org.mitre.oval:def:15802 |
comment | Oracle Linux 5.x | oval | oval:org.mitre.oval:def:15459 |
| description | The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request. | family | unix | id | oval:org.mitre.oval:def:9670 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request. | version | 30 |
|
redhat
via4
|
advisories | | rpms | - kernel-0:2.6.18-8.1.10.el5
- kernel-PAE-0:2.6.18-8.1.10.el5
- kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5
- kernel-PAE-devel-0:2.6.18-8.1.10.el5
- kernel-debuginfo-0:2.6.18-8.1.10.el5
- kernel-debuginfo-common-0:2.6.18-8.1.10.el5
- kernel-devel-0:2.6.18-8.1.10.el5
- kernel-doc-0:2.6.18-8.1.10.el5
- kernel-headers-0:2.6.18-8.1.10.el5
- kernel-kdump-0:2.6.18-8.1.10.el5
- kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5
- kernel-kdump-devel-0:2.6.18-8.1.10.el5
- kernel-xen-0:2.6.18-8.1.10.el5
- kernel-xen-debuginfo-0:2.6.18-8.1.10.el5
- kernel-xen-devel-0:2.6.18-8.1.10.el5
- kernel-0:2.6.9-55.0.12.EL
- kernel-debuginfo-0:2.6.9-55.0.12.EL
- kernel-devel-0:2.6.9-55.0.12.EL
- kernel-doc-0:2.6.9-55.0.12.EL
- kernel-hugemem-0:2.6.9-55.0.12.EL
- kernel-hugemem-devel-0:2.6.9-55.0.12.EL
- kernel-largesmp-0:2.6.9-55.0.12.EL
- kernel-largesmp-devel-0:2.6.9-55.0.12.EL
- kernel-smp-0:2.6.9-55.0.12.EL
- kernel-smp-devel-0:2.6.9-55.0.12.EL
- kernel-xenU-0:2.6.9-55.0.12.EL
- kernel-xenU-devel-0:2.6.9-55.0.12.EL
|
|
refmap
via4
|
bid | 25244 | confirm | | debian | DSA-1363 | secunia | - 26366
- 26647
- 26760
- 27436
- 27747
- 27912
- 28806
| suse | - SUSE-SA:2007:064
- SUSE-SA:2008:006
| ubuntu | USN-510-1 |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-10-18 | organization | Red Hat | statement | This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3. |
|
Last major update |
29-09-2017 - 01:29 |
Published |
09-08-2007 - 21:17 |
Last modified |
29-09-2017 - 01:29 |