Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0565: Integer Underflow (Wrap or Wraparound)

0
Medium
VulnerabilityCVE-2024-0565cvecve-2024-0565
Published: Mon Jan 15 2024 (01/15/2024, 20:02:02 UTC)
Source: CVE Database V5

Description

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

AI-Powered Analysis

AILast updated: 11/06/2025, 21:01:20 UTC

Technical Analysis

CVE-2024-0565 is a vulnerability identified in the Linux Kernel's SMB Client sub-component, specifically within the receive_encrypted_standard function located in fs/smb/client/smb2ops.c. The root cause is an integer underflow in the length parameter used by the memcpy function. Integer underflow occurs when an arithmetic operation causes a value to wrap around below its minimum representable value, resulting in an unexpectedly large unsigned integer. In this case, the underflow leads to an out-of-bounds memory read during the copying of encrypted SMB2 data. This memory corruption can cause the kernel to crash or behave unpredictably, resulting in a denial of service condition. The vulnerability requires either local or network access with low privileges and user interaction, and has a high attack complexity, meaning exploitation is not trivial. The CVSS v3.1 base score of 6.8 reflects medium severity, with high impact on confidentiality, integrity, and availability, indicating that successful exploitation could lead to significant system compromise. No public exploits or active exploitation have been reported to date. The vulnerability affects all versions of the Linux Kernel that include the vulnerable SMB client code and have not applied patches. Since SMB is widely used for file sharing and network communication, especially in mixed OS environments, this vulnerability poses a risk to systems relying on SMB client functionality.

Potential Impact

For European organizations, the impact of CVE-2024-0565 can be substantial, particularly for enterprises and public sector entities that use Linux-based systems for network file sharing via SMB. A successful attack could lead to denial of service, disrupting critical services and operations. The high impact on confidentiality and integrity suggests potential for information leakage or manipulation if the vulnerability is chained with other exploits, although the primary impact is DoS. Organizations with hybrid environments that integrate Linux SMB clients with Windows servers may face increased risk due to SMB’s widespread use. Disruptions could affect sectors such as finance, healthcare, manufacturing, and government, where availability and data integrity are paramount. Additionally, the requirement for user interaction and high attack complexity somewhat limits the immediacy of the threat but does not eliminate risk, especially in environments with untrained users or weak network segmentation.

Mitigation Recommendations

To mitigate CVE-2024-0565, organizations should prioritize applying official Linux Kernel patches as soon as they become available from trusted distributors or maintainers. Until patches are deployed, restricting SMB client usage on Linux systems can reduce exposure; this includes disabling SMB client functionality where not needed and limiting network access to SMB services through firewall rules and network segmentation. Monitoring kernel logs and system behavior for crashes or anomalies related to SMB client operations can help detect attempted exploitation. Employing endpoint protection solutions that can detect abnormal memory access patterns may provide additional defense. User education to avoid interacting with untrusted SMB shares or links is also important given the requirement for user interaction. Finally, maintaining up-to-date backups and incident response plans will help organizations recover quickly if a denial of service occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-15T19:19:12.076Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6717

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 11/6/2025, 9:01:20 PM

Last updated: 12/2/2025, 5:55:35 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats