Page 3 of 30 results (0.015 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

03 Aug 2015 — pioctls in OpenAFS 1.6.x before 1.6.13 allows local users to read kernel memory via crafted commands. Vulnerabilidad en pioctls en OpenAFS 1.6.x en versiones anteriores a 1.6.13, permite a usuarios locales leer la memoria del kernel a través de comandos manipulados. It was discovered that OpenAFS, the implementation of the distributed filesystem AFS, contained several flaws that could result in information leak, denial-of-service or kernel panic. • http://www.debian.org/security/2015/dsa-3320 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

14 Apr 2014 — OpenAFS before 1.6.7 delays the listen thread when an RXS_CheckResponse fails, which allows remote attackers to cause a denial of service (performance degradation) via an invalid packet. OpenAFS anterior a 1.6.7 retrasa el hilo de escucha cuando falla un RXS_CheckResponse, lo que permite a atacantes remotos causar una denegación de servicio (degradación de rendimiento) a través de un paquete invalido. • http://www.debian.org/security/2014/dsa-2899 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 9%CPEs: 19EXPL: 0

10 Apr 2014 — Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument. Desbordamiento de buffer en la llamada de procedimientos remotos (RPC) GetStatistics64 en OpenAFS 1.4.8 anterior a 1.6.7 permite a atacantes remotos causar una denegación de servicio (caída) a través de un argumento statsVersion manipulado. Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows r... • http://openafs.org/pages/security/OPENAFS-SA-2014-001.txt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 81EXPL: 0

29 Jul 2013 — OpenAFS before 1.4.15, 1.6.x before 1.6.5, and 1.7.x before 1.7.26 uses weak encryption (DES) for Kerberos keys, which makes it easier for remote attackers to obtain the service key. OpenAFS anterior a 1.4.15, 1.6.x anterior a 1.6.5 y 1.7.x anterior a 1.7.26 utiliza cifrado débil (DES) para las claves de Kerberos, lo que hace que sea más fácil para los atacantes remotos para obtener la clave de servicio. Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to... • http://www.debian.org/security/2013/dsa-2729 • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 2%CPEs: 61EXPL: 0

12 Mar 2013 — Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. Desbordamiento de entero en ptserver en OpenAFS anterior a v1.6.2 que permite a atacantes remotos causar una denegación del servicio (rotura) a través de una lista larga desde el UdToName RPC, que dispara un desbordamiento de bufer basado en pila. Buffer overflow in certain client utilities in OpenAFS before 1.6... • http://secunia.com/advisories/52342 • CWE-189: Numeric Errors •

CVSS: 8.8EPSS: 1%CPEs: 61EXPL: 0

12 Mar 2013 — Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. Desbordamiento de búfer en ciertas utilidades de cliente OpenAFS antes de v1.6.2 que permite a usuarios remotos autenticados provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un servidor de ficheros larga entrada ACL. Buffer overflow in certain client util... • http://secunia.com/advisories/52342 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 16%CPEs: 72EXPL: 0

09 Apr 2009 — Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays. Desbordamiento de búfer basado en montículo en el gestor de caché en el cliente OpenAFS v1.0 hasta la v1.4.8 y v1.5.0 hasta la 1.5.58 de las plataformas Unix, permite a atacant... • http://secunia.com/advisories/34655 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 4%CPEs: 79EXPL: 1

09 Apr 2009 — The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro. El gestor de caché en el cliente OpenAFS v1.0 hasta v1.4.8 y v1.5.0 hasta v1.5.58 en Linux, permite a atacantes remotos provocar una denegación de servicio (caída del sistema) a ... • http://secunia.com/advisories/34655 • CWE-189: Numeric Errors •

CVSS: 5.9EPSS: 11%CPEs: 4EXPL: 0

04 Jan 2008 — Race condition in fileserver in OpenAFS 1.3.50 through 1.4.5 and 1.5.0 through 1.5.27 allows remote attackers to cause a denial of service (daemon crash) by simultaneously acquiring and giving back file callbacks, which causes the handler for the GiveUpAllCallBacks RPC to perform linked-list operations without the host_glock lock. Condición de carrera en el servidor de ficheros de OpenAFS 1.3.50 hasta 1.4.5 y 1.5.0 hasta 1.5.27 permite a atacantes remotos provocar una denegación de servicio (caída de demoni... • http://lists.openafs.org/pipermail/openafs-announce/2007/000220.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.4EPSS: 5%CPEs: 21EXPL: 0

20 Mar 2007 — The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache. La configuración predeterminada en OpenAFS versiones 1.4.x anteriores a 1.4.4 y versiones 1.5.x anteriores a 1.5.17, admite programas setuid dentro de la celda local, lo que podría permitir a atacantes alcan... • http://secunia.com/advisories/24582 • CWE-16: Configuration •