The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
5.13.0-19.193.11.0-12.193.12.0-1.33.12.0-2.53.12.0-2.73.12.0-3.83.12.0-3.93.12.0-4.103.12.0-4.123.12.0-5.133.12.0-7.15+133 more3.13.0-165.2154.13.0-16.194.2.0-16.194.2.0-17.214.2.0-19.234.3.0-1.104.3.0-2.114.3.0-5.164.3.0-6.174.3.0-7.184.4.0-10.254.4.0-11.26+45 more4.4.0-87.1106.8.0-31.316.5.0-9.95.3.0-18.195.3.0-24.265.4.0-9.124.15.0-1001.15.3.0-1003.35.3.0-1008.95.3.0-1009.105.3.0-1010.115.4.0-1005.55.13.0-1005.6Exploitability
AV:NAC:LPR:NUI:RScope
S:UImpact
C:NI:NA:HCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H