Vulnerability Description
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.15, < 5.15.145 |
| Netapp | H300S | - |
| Netapp | H410S | - |
| Netapp | H500S | - |
| Netapp | H700S | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2023-32247Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2219803Issue TrackingPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230915-0011/Third Party Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-CAN-20478/PatchThird Party AdvisoryVDB Entry
- https://access.redhat.com/security/cve/CVE-2023-32247Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2219803Issue TrackingPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20230915-0011/Third Party Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-CAN-20478/PatchThird Party AdvisoryVDB Entry
FAQ
What is CVE-2023-32247?
CVE-2023-32247 is a vulnerability with a CVSS score of 7.5 (HIGH). A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of c...
How severe is CVE-2023-32247?
CVE-2023-32247 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32247?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Netapp H300S, Netapp H410S, Netapp H500S, Netapp H700S.