Page 5 of 28 results (0.003 seconds)

CVSS: 5.0EPSS: 4%CPEs: 61EXPL: 0

Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. Desbordamiento de entero en ptserver en OpenAFS anterior a v1.6.2 que permite a atacantes remotos causar una denegación del servicio (rotura) a través de una lista larga desde el UdToName RPC, que dispara un desbordamiento de bufer basado en pila. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-002.txt http://www.securityfocus.com/bid/58300 https://exchange.xforce.ibmcloud.com/vulnerabilities/82585 • CWE-189: Numeric Errors •

CVSS: 6.5EPSS: 5%CPEs: 61EXPL: 0

Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. Desbordamiento de búfer en ciertas utilidades de cliente OpenAFS antes de v1.6.2 que permite a usuarios remotos autenticados provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un servidor de ficheros larga entrada ACL. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-001.txt http://www.securityfocus.com/bid/58299 https://exchange.xforce.ibmcloud.com/vulnerabilities/82582 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 11%CPEs: 3EXPL: 0

Double free vulnerability in the Rx server process in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions allows remote attackers to cause a denial of service and execute arbitrary code via unknown vectors. Doble vulnerabilidad en el proceso del Rx Server en OpenAFS v1.4.14, v1.4.12, v1.4.7 y posiblemente otras versiones permite a atacantes remotos provocar una denegación de servicio y ejecutar código arbitrario a través de vectores desconocidos. • http://secunia.com/advisories/43371 http://secunia.com/advisories/43407 http://www.debian.org/security/2011/dsa-2168 http://www.securityfocus.com/bid/46428 http://www.securitytracker.com/id?1025095 http://www.vupen.com/english/advisories/2011/0410 http://www.vupen.com/english/advisories/2011/0411 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

The afs_linux_lock function in afs/LINUX/osi_vnodeops.c in the kernel module in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions does not properly handle errors, which allows attackers to cause a denial of service via unknown vectors. NOTE: some of these details are obtained from third party information. La función afs_linux_lock en afs/Linux/osi_vnodeops.c en el módulo del kernel en OpenAFS v1.4.14, v1.4.12, v1.4.7, y posiblemente otras versiones no controla correctamente los errores, que permite a atacantes provocar una denegación de servicio a través de vectores desconocidos. NOTA: Algunos de estos detalles han sido obtenidos de información de terceros. • http://secunia.com/advisories/43371 http://secunia.com/advisories/43407 http://www.debian.org/security/2011/dsa-2168 http://www.securityfocus.com/bid/46428 http://www.securitytracker.com/id?1025095 http://www.vupen.com/english/advisories/2011/0410 http://www.vupen.com/english/advisories/2011/0411 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 16%CPEs: 72EXPL: 0

Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays. Desbordamiento de búfer basado en montículo en el gestor de caché en el cliente OpenAFS v1.0 hasta la v1.4.8 y v1.5.0 hasta la 1.5.58 de las plataformas Unix, permite a atacantes remotos provocar una denegación de servicio (caída del sistema) o posiblemente ejecutar código de su elección a través de una respuesta RX que contenga más datos que los especificados en la petición, relativo al uso de las tablas XDR. • http://secunia.com/advisories/34655 http://secunia.com/advisories/34684 http://secunia.com/advisories/42896 http://security.gentoo.org/glsa/glsa-201101-05.xml http://www.debian.org/security/2009/dsa-1768 http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 http://www.openafs.org/security/OPENAFS-SA-2009-001.txt http://www.openafs.org/security/openafs-sa-2009-001.patch http://www.securityfocus.com/bid/34407 http://www.vupen.com/english/advisories/2009/0984 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •