SMB: Linux Kernel ksmbd Compounded Request Handling NULL Pointer Dereference

This signature detects attempts to exploit a known vulnerability against Linux Kernel. A successful attack can result in a denial-of-service condition.

Extended Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in compound request `smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session() will always return the first request smb2 header in a compound request. if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will return 0, i.e. The tree id check is skipped. This patch use ksmbd_req_buf_next() to get current command in compound.

Affected Products

Linux linux_kernel

Short Name
SMB:LNX-KSMBD-CMPD-RQT-HNDLG
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
CVE-2023-3866 CVE-2023-52442 Compounded Dereference Handling Kernel Linux NULL Pointer Request ksmbd
Release Date
09/29/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3765
False Positive
Unknown
Vendors

Linux

Found a potential security threat?