The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1422-1 | linux security update |
Debian DLA |
DLA-1422-2 | linux security update |
Debian DSA |
DSA-4187-1 | linux security update |
Debian DSA |
DSA-4188-1 | linux security update |
EUVD |
EUVD-2018-11719 | The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery. |
Ubuntu USN |
USN-3880-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3880-2 | Linux kernel (Trusty HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T03:51:47.336Z
Reserved: 2017-12-04T00:00:00.000Z
Link: CVE-2018-1066
No data.
Status : Modified
Published: 2018-03-02T08:29:00.337
Modified: 2024-11-21T03:59:06.443
Link: CVE-2018-1066
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN