Page 5 of 26 results (0.005 seconds)

CVSS: 5.0EPSS: 4%CPEs: 61EXPL: 0

Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. Desbordamiento de entero en ptserver en OpenAFS anterior a v1.6.2 que permite a atacantes remotos causar una denegación del servicio (rotura) a través de una lista larga desde el UdToName RPC, que dispara un desbordamiento de bufer basado en pila. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-002.txt http://www.securityfocus.com/bid/58300 https://exchange.xforce.ibmcloud.com/vulnerabilities/82585 • CWE-189: Numeric Errors •

CVSS: 6.5EPSS: 5%CPEs: 61EXPL: 0

Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. Desbordamiento de búfer en ciertas utilidades de cliente OpenAFS antes de v1.6.2 que permite a usuarios remotos autenticados provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un servidor de ficheros larga entrada ACL. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-001.txt http://www.securityfocus.com/bid/58299 https://exchange.xforce.ibmcloud.com/vulnerabilities/82582 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 16%CPEs: 72EXPL: 0

Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays. Desbordamiento de búfer basado en montículo en el gestor de caché en el cliente OpenAFS v1.0 hasta la v1.4.8 y v1.5.0 hasta la 1.5.58 de las plataformas Unix, permite a atacantes remotos provocar una denegación de servicio (caída del sistema) o posiblemente ejecutar código de su elección a través de una respuesta RX que contenga más datos que los especificados en la petición, relativo al uso de las tablas XDR. • http://secunia.com/advisories/34655 http://secunia.com/advisories/34684 http://secunia.com/advisories/42896 http://security.gentoo.org/glsa/glsa-201101-05.xml http://www.debian.org/security/2009/dsa-1768 http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 http://www.openafs.org/security/OPENAFS-SA-2009-001.txt http://www.openafs.org/security/openafs-sa-2009-001.patch http://www.securityfocus.com/bid/34407 http://www.vupen.com/english/advisories/2009/0984 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 4%CPEs: 79EXPL: 1

The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro. El gestor de caché en el cliente OpenAFS v1.0 hasta v1.4.8 y v1.5.0 hasta v1.5.58 en Linux, permite a atacantes remotos provocar una denegación de servicio (caída del sistema) a través de una respuesta RX con un valor en el código de error muy largo, lo que es interpretado como un puntero y desrefereciado, relativo al uso de la macro ERR_PTR. • http://secunia.com/advisories/34655 http://secunia.com/advisories/34684 http://secunia.com/advisories/36310 http://secunia.com/advisories/42896 http://security.gentoo.org/glsa/glsa-201101-05.xml http://www-01.ibm.com/support/docview.wss?uid=swg21396389 http://www-1.ibm.com/support/docview.wss?uid=swg1ID71123 http://www.debian.org/security/2009/dsa-1768 http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 http://www.openafs.org/security/OPENAFS-SA-2009-002.txt& • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 6%CPEs: 4EXPL: 0

Race condition in fileserver in OpenAFS 1.3.50 through 1.4.5 and 1.5.0 through 1.5.27 allows remote attackers to cause a denial of service (daemon crash) by simultaneously acquiring and giving back file callbacks, which causes the handler for the GiveUpAllCallBacks RPC to perform linked-list operations without the host_glock lock. Condición de carrera en el servidor de ficheros de OpenAFS 1.3.50 hasta 1.4.5 y 1.5.0 hasta 1.5.27 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) al adquirir simultáneamente y devolver llamadas a ficheros, lo cual provoca que el gestor de GiveUpAllCallBacks RPC realice operaciones de listas enlazadas sin el bloqueo host_glock. • http://lists.openafs.org/pipermail/openafs-announce/2007/000220.html http://secunia.com/advisories/28327 http://secunia.com/advisories/28401 http://secunia.com/advisories/28433 http://secunia.com/advisories/28636 http://security.gentoo.org/glsa/glsa-200801-04.xml http://www.debian.org/security/2008/dsa-1458 http://www.mandriva.com/security/advisories?name=MDVSA-2008:207 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.openafs.org/securi • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •