CVE-2023-39180
low-risk
Published 2024-11-18
A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.0/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (3)
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-39180
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2326531
Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-24-589/
18
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal