Page 6 of 30 results (0.016 seconds)

CVSS: 6.5EPSS: 5%CPEs: 61EXPL: 0

Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. Desbordamiento de búfer en ciertas utilidades de cliente OpenAFS antes de v1.6.2 que permite a usuarios remotos autenticados provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un servidor de ficheros larga entrada ACL. • http://secunia.com/advisories/52342 http://secunia.com/advisories/52480 http://www.debian.org/security/2013/dsa-2638 http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 http://www.openafs.org/pages/security/OPENAFS-SA-2013-001.txt http://www.securityfocus.com/bid/58299 https://exchange.xforce.ibmcloud.com/vulnerabilities/82582 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 16%CPEs: 72EXPL: 0

Heap-based buffer overflow in the cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58 on Unix platforms allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via an RX response containing more data than specified in a request, related to use of XDR arrays. Desbordamiento de búfer basado en montículo en el gestor de caché en el cliente OpenAFS v1.0 hasta la v1.4.8 y v1.5.0 hasta la 1.5.58 de las plataformas Unix, permite a atacantes remotos provocar una denegación de servicio (caída del sistema) o posiblemente ejecutar código de su elección a través de una respuesta RX que contenga más datos que los especificados en la petición, relativo al uso de las tablas XDR. • http://secunia.com/advisories/34655 http://secunia.com/advisories/34684 http://secunia.com/advisories/42896 http://security.gentoo.org/glsa/glsa-201101-05.xml http://www.debian.org/security/2009/dsa-1768 http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 http://www.openafs.org/security/OPENAFS-SA-2009-001.txt http://www.openafs.org/security/openafs-sa-2009-001.patch http://www.securityfocus.com/bid/34407 http://www.vupen.com/english/advisories/2009/0984 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 4%CPEs: 79EXPL: 1

The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro. El gestor de caché en el cliente OpenAFS v1.0 hasta v1.4.8 y v1.5.0 hasta v1.5.58 en Linux, permite a atacantes remotos provocar una denegación de servicio (caída del sistema) a través de una respuesta RX con un valor en el código de error muy largo, lo que es interpretado como un puntero y desrefereciado, relativo al uso de la macro ERR_PTR. • http://secunia.com/advisories/34655 http://secunia.com/advisories/34684 http://secunia.com/advisories/36310 http://secunia.com/advisories/42896 http://security.gentoo.org/glsa/glsa-201101-05.xml http://www-01.ibm.com/support/docview.wss?uid=swg21396389 http://www-1.ibm.com/support/docview.wss?uid=swg1ID71123 http://www.debian.org/security/2009/dsa-1768 http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 http://www.openafs.org/security/OPENAFS-SA-2009-002.txt& • CWE-189: Numeric Errors •

CVSS: 4.3EPSS: 7%CPEs: 4EXPL: 0

Race condition in fileserver in OpenAFS 1.3.50 through 1.4.5 and 1.5.0 through 1.5.27 allows remote attackers to cause a denial of service (daemon crash) by simultaneously acquiring and giving back file callbacks, which causes the handler for the GiveUpAllCallBacks RPC to perform linked-list operations without the host_glock lock. Condición de carrera en el servidor de ficheros de OpenAFS 1.3.50 hasta 1.4.5 y 1.5.0 hasta 1.5.27 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) al adquirir simultáneamente y devolver llamadas a ficheros, lo cual provoca que el gestor de GiveUpAllCallBacks RPC realice operaciones de listas enlazadas sin el bloqueo host_glock. • http://lists.openafs.org/pipermail/openafs-announce/2007/000220.html http://secunia.com/advisories/28327 http://secunia.com/advisories/28401 http://secunia.com/advisories/28433 http://secunia.com/advisories/28636 http://security.gentoo.org/glsa/glsa-200801-04.xml http://www.debian.org/security/2008/dsa-1458 http://www.mandriva.com/security/advisories?name=MDVSA-2008:207 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.openafs.org/securi • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 3%CPEs: 21EXPL: 0

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache. La configuración predeterminada en OpenAFS versiones 1.4.x anteriores a 1.4.4 y versiones 1.5.x anteriores a 1.5.17, admite programas setuid dentro de la celda local, lo que podría permitir a atacantes alcanzar privilegios suplantando una respuesta a una petición FetchStatus del administrador de caché AFS y establecer la propiedad de setuid y root para archivos en la memoria caché. • http://secunia.com/advisories/24582 http://secunia.com/advisories/24599 http://secunia.com/advisories/24607 http://secunia.com/advisories/24720 http://security.gentoo.org/glsa/glsa-200704-03.xml http://www.debian.org/security/2007/dsa-1271 http://www.mandriva.com/security/advisories?name=MDKSA-2007:066 http://www.openafs.org/pipermail/openafs-announce/2007/000185.html http://www.openafs.org/pipermail/openafs-announce/2007/000186.html http://www.openafs.org/pipermail/openafs-anno • CWE-16: Configuration •