Page 3 of 33 results (0.010 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6.17 allows remote authenticated users from foreign Kerberos realms to bypass intended access restrictions and create arbitrary groups as administrators by leveraging mishandling of the creator ID. La función newEntry en ptserver/ptprocs.c en OpenAFS en versiones anteriores a 1.6.17 permite a usuarios remotos autenticados de dominios Kerberos ajenos eludir las restricciones destinadas al acceso y crear grupos arbitrarios como administradores aprovechando que no maneja correctamente el ID creator. • http://git.openafs.org/?p=openafs.git%3Ba=commitdiff%3Bh=396240cf070a806b91fea81131d034e1399af1e0 http://www.debian.org/security/2016/dsa-3569 http://www.openafs.org/pages/security/OPENAFS-SA-2016-001.txt https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17 • CWE-284: Improper Access Control •

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 0

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network. rx/rx.c en OpenAFS en versiones anteriores a 1.6.15 y 1.7.x en versiones anteriores a 1.7.33 no inicializa adecuadamente el relleno de una estructura de datos cuando construye un paquete de reconocimiento (ACK) Rx, lo que permite a atacantes remotos obtener información sensible (1) llevando a cabo un ataque de repetición o (2) rastreando la red. • http://www.debian.org/security/2015/dsa-3387 http://www.securitytracker.com/id/1034039 https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15 https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 49EXPL: 0

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network. rx/rx.c en OpenAFS 1.5.75 hasta la versión 1.5.78, 1.6.x en vesiones anteriores a 1.6.15 y 1.7.x en versiones anteriores a 1.7.33 no inicializa adecuadamente el relleno en el final de un paquete de reconocimiento (ACK) Rx, lo que permite a atacantes remotos obtener información sensible (1) llevando a cabo un ataque de repetición o (2) rastreando la red. • http://www.debian.org/security/2015/dsa-3387 http://www.securitytracker.com/id/1034039 https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15 https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 0

The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC. Vulnerabilidad en OpenAFS en versiones anteriores a 1.6.13, permite a usuarios remotos autenticados causar una denegación de servicio (lectura fuera de rango y caída) a través de una expresión regular manipulada en una RPC VL_ListAttributesN2. • http://www.debian.org/security/2015/dsa-3320 http://www.openafs.org/pages/security/OPENAFS-SA-2015-006.txt https://lists.openafs.org/pipermail/openafs-announce/2015/000486.html https://www.openafs.org/dl/openafs/1.6.13/RELNOTES-1.6.13 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the Solaris kernel extension in OpenAFS before 1.6.13 allows local users to cause a denial of service (panic or deadlock) or possibly have other unspecified impact via a large group list when joining a PAG. Desbordamiento de buffer en la extensión de kernel Solaris en OpenAFS en versiones anteriores a 1.6.13, permite a usuarios locales causar una denegación de servicio (panic o bloqueo) o posiblemente tener otro impacto no especificado a través de una lista de grupo de gran tamaño cuando se unen a un PAG. • http://www.openafs.org/pages/security/OPENAFS-SA-2015-005.txt http://www.securitytracker.com/id/1033262 https://lists.openafs.org/pipermail/openafs-announce/2015/000486.html https://www.openafs.org/dl/openafs/1.6.13/RELNOTES-1.6.13 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •