Vulnerability Description
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.22 |
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=246595
- http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.23-rc1
- http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
- http://secunia.com/advisories/26366
- http://secunia.com/advisories/26647
- http://secunia.com/advisories/26760
- http://secunia.com/advisories/27436
- http://secunia.com/advisories/27747
- http://secunia.com/advisories/27912
- http://secunia.com/advisories/28806
- http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm
- http://www.debian.org/security/2007/dsa-1363
- http://www.redhat.com/support/errata/RHSA-2007-0705.html
- http://www.redhat.com/support/errata/RHSA-2007-0939.html
FAQ
What is CVE-2007-3843?
CVE-2007-3843 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for secur...
How severe is CVE-2007-3843?
CVE-2007-3843 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3843?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.