Skip to content
Untitled design-Aug-24-2022-05-35-46-93-PM
Patrick MünchDecember 23, 20222 min read

Critical Linux Vulnerability (ZDI-22-1690, ZDI-CAN-17816): Find and Fix with cnquery

800x418 blog feature images (4)-2

The Zero Day Initiative issued on 22 December 2022 a new critical Linux Kernel vulnerability ZDI-22-1690.

Get started with cnquery today.

What’s ksmbd and how does it relate to this Linux kernel vulnerability?

ksmbd is a Linux kernel component responsible for handling SMB (Server Message Block) protocol requests. SMB is a network protocol used for file sharing and printing between devices on a network.

ksmbd is used by the Linux kernel to handle incoming SMB requests and to perform the necessary actions to fulfill those requests. This can include reading or writing files, creating directories, or printing documents.

It is an essential component of the Linux kernel that plays a critical role in enabling file sharing and other network services on Linux-based systems.

What's this Linux kernel vulnerability about? 

Linux Kernel ksmbd Use-After-Free Remote Code Execution Vulnerability is a security issue that was discovered in the Linux kernel in July 2022. The vulnerability, which is classified as a Use-After-Free Remote Code Execution vulnerability, allows an attacker to execute arbitrary code on a vulnerable system.

The vulnerability exists in the ksmbd component of the Linux kernel, which is responsible for handling SMB (Server Message Block) protocol requests. SMB is a network protocol used for file sharing and printing between devices on a network.

The vulnerability can be exploited by an attacker who can send a malicious SMB request to a vulnerable system. The system does not validate the existence of an object, which allows the attacker to execute their own code on the system. This can potentially allow the attacker to gain unauthorized access to the system.

Are your systems affected by this Linux kernel vulnerability?

Mondoo’s GraphQL-based query language, MQL, allows you to quickly gather information about installed packages on your assets, including container images, VMs, bare-metal servers… everything.

If you have not yet installed cnquery, follow our instructions. Once you've installed it, you can gather information about installed packages from your systems:

packages.where(name == /ksmbd/)

Identify the running kernel version.

kernel.info

Identify if the ksmb kernel module is loaded.

kernel.modules.where( name == /ksmb/ )

Screenshot_20221223_135428

Get the required information with cnquery to connect to your targets via ssh:

cnquery scan ssh vagrant@192.168.56.247 --ask-pass --querypack mondoo-linux-incident-response

via ssh

If ksmb kernel module is not loaded and the ksmbd package is not installed, then you are not affected by this vulnerability. 

The vulnerability is fixed in kernel version 5.15.61, and most people are using the LTS (Long Term Stable) kernel version, and all issues reported by ZDI are fixed, the patches have been propagated to that kernel versions.

Get started with cnquery today.

avatar

Patrick Münch

Chief Information Security Officer (CISO) at Mondoo, Patrick is highly skilled at protecting and hacking every system he gets his hands on. He built a successful penetration testing and incident response team at SVA GmbH, their goal to increase the security level of companies and limit the impact of ransomware attacks. Now, as part of the Mondoo team, Patrick can help protect far more organizations from cybersecurity threats.

RELATED ARTICLES

view raw