CVE Number – CVE-2018-12930
A vulnerability in the Linux Kernel could allow a local attacker to cause a denial of service (DoS) condition on a targeted system.
The vulnerability exists in the ntfs_end_buffer_async_read() function in the ntfs.ko filesystem driver of the affected software. An attacker could exploit the vulnerability by mounting a crafted NTFS filesystem that submits malicious input to the affected software. A successful exploit could trigger a stack-based out-of-bounds write error and cause the affected software to terminate abnormally, leading to a DoS condition.
The maintainer of the Linux NTFS subsystem has confirmed the vulnerability; however, software updates are not available.
To exploit this vulnerability, the attacker must have user-level access to the targeted system. This access requirement could reduce the likelihood of a successful exploit.
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to access local systems.
Administrators are advised to allow only privileged users to access administration or management systems.
Administrators are advised to monitor critical systems.
At the time this alert was first published, Kernel.org had not released additional information; however, the maintainer of the Linux NTFS subsystem has confirmed the vulnerability in a post to the linux-ntfs-dev mailing list at the following link: Multiple Memory Corruption Issues in ntfs.ko (Linux 4.15.0-15.16)
At the time this alert was first published, Kernel.org had not released a software fix.
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.