Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      What Zen And The Art Of Motorcycle Maintenance Can Teach Us About Web Design

      May 23, 2025

      AI updates from the past week: Anthropic launches Claude 4 models, OpenAI adds new tools to Responses API, and more — May 23, 2025

      May 23, 2025

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 22, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 22, 2025

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025

      I missed out on the Clair Obscur: Expedition 33 Collector’s Edition but thankfully, the developers are launching something special

      May 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025
      Recent

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025

      Opal – Optimizely’s AI-Powered Marketing Assistant

      May 22, 2025

      Content Compliance Without the Chaos: How Optimizely CMP Empowers Financial Services Marketers

      May 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Linux Networking: Mastering VLAN Trunking, Bonding, and QoS for High-Performance Systems

      May 23, 2025
      Recent

      Linux Networking: Mastering VLAN Trunking, Bonding, and QoS for High-Performance Systems

      May 23, 2025

      Fortifying Debian With SELinux by Enforcing Mandatory Access Control for Ultimate System Security

      May 23, 2025

      extundelete recovers deleted files from ext3 or ext4 partitions

      May 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»AI Finds What Humans Missed: OpenAI’s o3 Spots Linux Zero-Day

    AI Finds What Humans Missed: OpenAI’s o3 Spots Linux Zero-Day

    May 23, 2025

    CVE-2025-37899

    A zero-day vulnerability in the Linux kernel’s SMB (Server Message Block) implementation, identified as CVE-2025-37899, has been discovered using OpenAI’s powerful language model, o3. The vulnerability is a use-after-free flaw located in the logoff command handler of the ksmbd kernel module. 

    Security researcher Sean H. documented the process in a detailed technical blog. He had initially set out to audit ksmbd, a Linux kernel module responsible for implementing the SMB3 protocol. While intending to take a break from large language model (LLM) tools, curiosity led him to benchmark the capabilities of o3, a new AI model from OpenAI. 

    Rather than using complex frameworks or automation tools, Sean leveraged only the o3 API to analyze targeted code sections. During this process, o3 successfully unearthed CVE-2025-37899, a zero-day vulnerability in the Linux kernel. The model identified a scenario where shared objects between concurrent server connections led to unsafe memory access—specifically, a use-after-free situation in the SMB ‘logoff’ command handler. 

    Technical Breakdown of CVE-2025-37899 

    The issue arises when one thread processes an SMB2 LOGOFF request and frees the sess->user object while another thread may still be using it. This occurs without proper synchronization mechanisms, which can lead to dereferencing of freed memory, opening doors to kernel memory corruption or arbitrary code execution. 

    The vulnerability exploits a subtle interaction between SMB session handling and Linux kernel memory management:

    1. Multiple connections may bind to the same SMB session. 
    2. One thread (Worker-B) handling a LOGOFF request frees the session’s user object (ksmbd_free_user(sess->user)). 
    3. Another thread (Worker-A), still processing requests using the same session, continues accessing sess->user, now pointing to freed memory.

    Depending on timing, this results in a traditional use-after-free exploit or a null pointer dereference, leading to system crashes or privilege escalation. 

    Hostinger

    Comparative Performance: o3 vs. Other Models 

    Interestingly, o3 also rediscovered CVE-2025-37778, another use-after-free vulnerability that Sean had previously identified manually. This bug resides in the Kerberos authentication path during SMB session setup. The AI detected this bug in 8 out of 100 runs, while OpenAI’s Claude Sonnet 3.7 managed only 3 detections in 100 tries, and Claude 3.5 failed to detect it altogether.

    These results reflect both the promise and current limitations of AI-assisted vulnerability research. o3 showed notable capability but also returned a high false positive rate—about 28 out of 100 attempts. Still, with a true positive to false positive ratio of around 1:4.5, the model proved useful enough to warrant serious consideration in practical workflows. 

    Lessons from o3’s Analysis 

    One of the most insightful takeaways from o3’s analysis of CVE-2025-37899 was its understanding of concurrency in kernel operations. The model successfully reasoned through non-trivial control flow paths and object lifecycle management under concurrent execution—something even experienced researchers may overlook, especially under time pressure.

    What’s more compelling is that o3 sometimes offered better remediation advice than its human counterpart. For example, in addressing CVE-2025-37778, Sean had initially suggested setting sess->user = NULL after freeing it. However, o3 identified that such a fix might be insufficient due to the SMB protocol allowing multiple connections to bind to a session.

    Conclusion  

    Large language models are not yet a replacement for expert analysts. o3’s success in identifying complex flaws highlights its ability to augment human expertise, streamline analysis, and extend the reach of automated security tools. Though the experiment revealed limitations in processing large codebases, it also highlighted the model’s effectiveness in targeted scans and the importance of developing tools to manage false positives and intelligently structure input.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleU.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
    Next Article International Operation Targets Qakbot Hacker, $24M in Crypto Seized

    Related Posts

    Development

    Error’d: Mike’s Job Search Job

    May 23, 2025
    Development

    ESET takes part in global operation to disrupt Lumma Stealer

    May 23, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-0639 – GitLab CE/EE Service Availability Denial of Service

    Common Vulnerabilities and Exposures (CVEs)

    100 Days of Web Experiments: A Designer’s Journey into the Unknown

    News & Updates

    How to Set Semantic Versioning for .NET Core Apps and Libraries

    Development

    CVE-2025-4270 – TOTOLINK A720R CGI Config Handler Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    PowerToys 0.91 update brings major improvements to Command Palette & more

    May 16, 2025

    PowerToys 0.91 is now available as part of the May 2025 update. For the uninitiated,…

    Netflix Introduces Go-with-the-Flow: Motion-Controllable Video Diffusion Models Using Real-Time Warped Noise

    January 26, 2025

    GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover

    August 15, 2024

    ⚡ PERFATHON 2025 – The First-Ever Hackathon at Perficient 👩‍💻

    April 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.