CVE-2019-18602
https://notcve.org/view.php?id=CVE-2019-18602
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to an information disclosure vulnerability because uninitialized scalars are sent over the network to a peer. OpenAFS versiones anteriores a la versión 1.6.24 y versiones anteriores 1.8.x anteriores a 1.8.5, es propenso a una vulnerabilidad de divulgación de información porque los escalares no inicializados son enviados a través de la red a un peer. • https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html https://openafs.org/pages/security/OPENAFS-SA-2019-002.txt • CWE-908: Use of Uninitialized Resource •
CVE-2019-18603
https://notcve.org/view.php?id=CVE-2019-18603
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer. OpenAFS versiones anteriores a la versión 1.6.24 y versiones 1.8.x anteriores a la versión 1.8.5, es propenso al filtrado de información en determinadas condiciones de error porque las variables de salida RPC no inicializadas son enviadas a través de la red a un peer. • https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html https://openafs.org/pages/security/OPENAFS-SA-2019-001.txt • CWE-908: Use of Uninitialized Resource •
CVE-2019-18601
https://notcve.org/view.php?id=CVE-2019-18601
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to denial of service from unserialized data access because remote attackers can make a series of VOTE_Debug RPC calls to crash a database server within the SVOTE_Debug RPC handler. OpenAFS versiones anteriores a 1.6.24 y versiones 1.8.x anteriores a 1.8.5, es propenso a una denegación de servicio por acceso a datos no serializados porque los atacantes remotos pueden llevar a cabo una serie de llamadas RPC de VOTE_Debug para bloquear un servidor de base de datos dentro del manejador RPC de SVOTE_Debug. • https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html https://openafs.org/pages/security/OPENAFS-SA-2019-003.txt • CWE-502: Deserialization of Untrusted Data •
CVE-2018-16949
https://notcve.org/view.php?id=CVE-2018-16949
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections. Se ha descubierto un problema en OpenAFS, en versiones anteriores a la 1.6.23 y versiones 1.8.x anteriores a la 1.8.2. Se implementaron varios tipos de datos empleados como variables de entrada RPC como tipos de array sin limitar, limitados solo por el campo length de 32 bits a 4 GB. • http://openafs.org/pages/security/OPENAFS-SA-2018-003.txt http://www.securityfocus.com/bid/106375 https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html https://www.debian.org/security/2018/dsa-4302 • CWE-400: Uncontrolled Resource Consumption •
CVE-2018-16948
https://notcve.org/view.php?id=CVE-2018-16948
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory. Se ha descubierto un problema en OpenAFS, en versiones anteriores a la 1.6.23 y versiones 1.8.x anteriores a la 1.8.2. • http://openafs.org/pages/security/OPENAFS-SA-2018-002.txt https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html https://www.debian.org/security/2018/dsa-4302 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •