Page 5 of 29 results (0.024 seconds)

CVSS: 4.3EPSS: 0%CPEs: 81EXPL: 0

OpenAFS before 1.4.15, 1.6.x before 1.6.5, and 1.7.x before 1.7.26 uses weak encryption (DES) for Kerberos keys, which makes it easier for remote attackers to obtain the service key. OpenAFS anterior a 1.4.15, 1.6.x anterior a 1.6.5 y 1.7.x anterior a 1.7.26 utiliza cifrado débil (DES) para las claves de Kerberos, lo que hace que sea más fácil para los atacantes remotos para obtener la clave de servicio. • http://www.debian.org/security/2013/dsa-2729 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-003.txt • CWE-310: Cryptographic Issues •

CVSS: 5.0EPSS: 4%CPEs: 61EXPL: 0

Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. Desbordamiento de entero en ptserver en OpenAFS anterior a v1.6.2 que permite a atacantes remotos causar una denegación del servicio (rotura) a través de una lista larga desde el UdToName RPC, que dispara un desbordamiento de bufer basado en pila. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-002.txt http://www.securityfocus.com/bid/58300 https://exchange.xforce.ibmcloud.com/vulnerabilities/82585 • CWE-189: Numeric Errors •

CVSS: 6.5EPSS: 5%CPEs: 61EXPL: 0

Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. Desbordamiento de búfer en ciertas utilidades de cliente OpenAFS antes de v1.6.2 que permite a usuarios remotos autenticados provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un servidor de ficheros larga entrada ACL. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-001.txt http://www.securityfocus.com/bid/58299 https://exchange.xforce.ibmcloud.com/vulnerabilities/82582 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 11%CPEs: 3EXPL: 0

Double free vulnerability in the Rx server process in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions allows remote attackers to cause a denial of service and execute arbitrary code via unknown vectors. Doble vulnerabilidad en el proceso del Rx Server en OpenAFS v1.4.14, v1.4.12, v1.4.7 y posiblemente otras versiones permite a atacantes remotos provocar una denegación de servicio y ejecutar código arbitrario a través de vectores desconocidos. • http://secunia.com/advisories/43371 http://secunia.com/advisories/43407 http://www.debian.org/security/2011/dsa-2168 http://www.securityfocus.com/bid/46428 http://www.securitytracker.com/id?1025095 http://www.vupen.com/english/advisories/2011/0410 http://www.vupen.com/english/advisories/2011/0411 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

The afs_linux_lock function in afs/LINUX/osi_vnodeops.c in the kernel module in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions does not properly handle errors, which allows attackers to cause a denial of service via unknown vectors. NOTE: some of these details are obtained from third party information. La función afs_linux_lock en afs/Linux/osi_vnodeops.c en el módulo del kernel en OpenAFS v1.4.14, v1.4.12, v1.4.7, y posiblemente otras versiones no controla correctamente los errores, que permite a atacantes provocar una denegación de servicio a través de vectores desconocidos. NOTA: Algunos de estos detalles han sido obtenidos de información de terceros. • http://secunia.com/advisories/43371 http://secunia.com/advisories/43407 http://www.debian.org/security/2011/dsa-2168 http://www.securityfocus.com/bid/46428 http://www.securitytracker.com/id?1025095 http://www.vupen.com/english/advisories/2011/0410 http://www.vupen.com/english/advisories/2011/0411 • CWE-20: Improper Input Validation •