The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1363-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2007-3827 | The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request. |
Ubuntu USN |
USN-510-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:28:52.495Z
Reserved: 2007-07-18T00:00:00
Link: CVE-2007-3843
No data.
Status : Deferred
Published: 2007-08-09T21:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-3843
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN