CVE-2023-45896Incorrect Default Permissions in Linux

Severity
7.1HIGHNVD
EPSS
0.1%
top 77.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 28

Description

ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

Debianlinux/linux_kernel< 6.1.115-1+2
debiandebian/linux< linux 6.1.115-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.115-1 (bookworm)

🔴Vulnerability Details

2
OSV
CVE-2023-45896: ntfs3 in the Linux kernel through 62024-08-28
GHSA
GHSA-9477-m2w2-6wg3: ntfs3 in the Linux kernel before 62024-08-28

📋Vendor Advisories

2
Red Hat
kernel: ntfs3: kernel memory read by mounting a filesystem2024-08-28
Debian
CVE-2023-45896: linux - ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker t...2023