Vulnerability Description
The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 4.10.15 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3PatchVendor Advisory
- http://www.securityfocus.com/bid/103378Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1539599Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlMailing ListThird Party Advisory
- https://patchwork.kernel.org/patch/10187633/PatchThird Party Advisory
- https://usn.ubuntu.com/3880-1/Third Party Advisory
- https://usn.ubuntu.com/3880-2/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4187Third Party Advisory
- https://www.debian.org/security/2018/dsa-4188Third Party Advisory
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3PatchVendor Advisory
- http://www.securityfocus.com/bid/103378Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1539599Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/cabfb3680f78981d26c078a26e5c748531257ebPatchThird Party Advisory
FAQ
What is CVE-2018-1066?
CVE-2018-1066 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client ...
How severe is CVE-2018-1066?
CVE-2018-1066 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1066?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux.