OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer.
Max CVSS
5.9
EPSS Score
0.15%
Published
2019-10-29
Updated
2022-01-01
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to an information disclosure vulnerability because uninitialized scalars are sent over the network to a peer.
Max CVSS
7.5
EPSS Score
0.18%
Published
2019-10-29
Updated
2022-01-01
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to denial of service from unserialized data access because remote attackers can make a series of VOTE_Debug RPC calls to crash a database server within the SVOTE_Debug RPC handler.
Max CVSS
7.5
EPSS Score
0.23%
Published
2019-10-29
Updated
2019-11-06
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.
Max CVSS
7.5
EPSS Score
2.94%
Published
2018-09-12
Updated
2019-03-07
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory.
Max CVSS
7.5
EPSS Score
0.43%
Published
2018-09-12
Updated
2018-11-19
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. The backup tape controller (butc) process accepts incoming RPCs but does not require (or allow for) authentication of those RPCs. Handling those RPCs results in operations being performed with administrator credentials, including dumping/restoring volume contents and manipulating the backup database. For example, an unauthenticated attacker can replace any volume's content with arbitrary data.
Max CVSS
9.8
EPSS Score
0.67%
Published
2018-09-12
Updated
2019-10-03
OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
Max CVSS
7.8
EPSS Score
1.01%
Published
2017-12-06
Updated
2019-10-03
OpenAFS 1.6.19 and earlier allows remote attackers to obtain sensitive directory information via vectors involving the (1) client cache partition, (2) fileserver vice partition, or (3) certain RPC responses.
Max CVSS
5.3
EPSS Score
0.17%
Published
2017-02-06
Updated
2017-02-08
The client in OpenAFS before 1.6.17 does not properly initialize the (1) AFSStoreStatus, (2) AFSStoreVolumeStatus, (3) VldbListByAttributes, and (4) ListAddrByAttributes structures, which might allow remote attackers to obtain sensitive memory information by leveraging access to RPC call traffic.
Max CVSS
5.3
EPSS Score
0.30%
Published
2016-05-13
Updated
2016-05-19
The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID.
Max CVSS
6.5
EPSS Score
0.17%
Published
2016-05-13
Updated
2016-05-19
Off-by-one error in afs_pioctl.c in OpenAFS before 1.6.16 might allow local users to cause a denial of service (memory overwrite and system crash) via a pioctl with an input buffer size of 4096 bytes.
Max CVSS
7.8
EPSS Score
0.04%
Published
2016-05-13
Updated
2018-05-17
rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
Max CVSS
5.0
EPSS Score
0.56%
Published
2015-11-06
Updated
2016-12-07
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
Max CVSS
5.0
EPSS Score
0.69%
Published
2015-11-06
Updated
2016-12-07
The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.
Max CVSS
4.0
EPSS Score
0.37%
Published
2015-09-02
Updated
2015-09-02
Buffer overflow in the Solaris kernel extension in OpenAFS before 1.6.13 allows local users to cause a denial of service (panic or deadlock) or possibly have other unspecified impact via a large group list when joining a PAG.
Max CVSS
4.6
EPSS Score
0.04%
Published
2015-08-12
Updated
2017-09-21
OpenAFS before 1.6.13 allows remote attackers to spoof bos commands via unspecified vectors.
Max CVSS
6.8
EPSS Score
0.81%
Published
2015-08-12
Updated
2017-09-21
vos in OpenAFS before 1.6.13, when updating VLDB entries, allows remote attackers to obtain stack data by sniffing the network.
Max CVSS
4.3
EPSS Score
0.56%
Published
2015-08-12
Updated
2017-09-21
OpenAFS 1.6.8 does not properly clear the fields in the host structure, which allows remote attackers to cause a denial of service (uninitialized memory access and crash) via unspecified vectors related to TMAY requests.
Max CVSS
5.0
EPSS Score
1.70%
Published
2014-06-17
Updated
2014-06-21
OpenAFS before 1.6.7 delays the listen thread when an RXS_CheckResponse fails, which allows remote attackers to cause a denial of service (performance degradation) via an invalid packet.
Max CVSS
5.0
EPSS Score
0.20%
Published
2014-04-14
Updated
2014-04-15
Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument.
Max CVSS
5.0
EPSS Score
29.98%
Published
2014-04-14
Updated
2016-08-24
The vos command in OpenAFS 1.6.x before 1.6.5, when using the -encrypt option, only enables integrity protection and sends data in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
Max CVSS
4.3
EPSS Score
0.15%
Published
2013-11-05
Updated
2016-08-24
OpenAFS before 1.4.15, 1.6.x before 1.6.5, and 1.7.x before 1.7.26 uses weak encryption (DES) for Kerberos keys, which makes it easier for remote attackers to obtain the service key.
Max CVSS
4.3
EPSS Score
0.21%
Published
2013-11-05
Updated
2016-08-24
Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow.
Max CVSS
5.0
EPSS Score
4.10%
Published
2013-03-14
Updated
2017-08-29
Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry.
Max CVSS
6.5
EPSS Score
4.55%
Published
2013-03-14
Updated
2017-08-29
The afs_linux_lock function in afs/LINUX/osi_vnodeops.c in the kernel module in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions does not properly handle errors, which allows attackers to cause a denial of service via unknown vectors. NOTE: some of these details are obtained from third party information.
Max CVSS
5.0
EPSS Score
1.02%
Published
2011-02-19
Updated
2011-03-11
31 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!