CVE-2014-0159
Mandriva Linux Security Advisory 2014-244
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument.
Desbordamiento de buffer en la llamada de procedimientos remotos (RPC) GetStatistics64 en OpenAFS 1.4.8 anterior a 1.6.7 permite a atacantes remotos causar una denegación de servicio (caída) a través de un argumento statsVersion manipulado.
Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a long fileserver ACL entry. Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. OpenAFS before 1.4.15, 1.6.x before 1.6.5, and 1.7.x before 1.7.26 uses weak encryption for Kerberos keys, which makes it easier for remote attackers to obtain the service key. The vos command in OpenAFS 1.6.x before 1.6.5, when using the -encrypt option, only enables integrity protection and sends data in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network. Buffer overflow in the GetStatistics64 remote procedure call in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service via a crafted statsVersion argument. A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior. The updated packages have been upgraded to the 1.4.15 version and patched to correct these issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-03 CVE Reserved
- 2014-04-10 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.openafs.org/frameset/dl/openafs/1.6.7/ChangeLog | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://openafs.org/pages/security/OPENAFS-SA-2014-001.txt | 2016-08-24 | |
http://www.debian.org/security/2014/dsa-2899 | 2016-08-24 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 | 2016-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.8 Search vendor "Openafs" for product "Openafs" and version "1.4.8" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.9 Search vendor "Openafs" for product "Openafs" and version "1.4.9" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.10 Search vendor "Openafs" for product "Openafs" and version "1.4.10" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.11 Search vendor "Openafs" for product "Openafs" and version "1.4.11" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.12 Search vendor "Openafs" for product "Openafs" and version "1.4.12" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.14 Search vendor "Openafs" for product "Openafs" and version "1.4.14" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.14.1 Search vendor "Openafs" for product "Openafs" and version "1.4.14.1" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.4.15 Search vendor "Openafs" for product "Openafs" and version "1.4.15" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.0 Search vendor "Openafs" for product "Openafs" and version "1.6.0" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.1 Search vendor "Openafs" for product "Openafs" and version "1.6.1" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.2 Search vendor "Openafs" for product "Openafs" and version "1.6.2" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.2.1 Search vendor "Openafs" for product "Openafs" and version "1.6.2.1" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.3 Search vendor "Openafs" for product "Openafs" and version "1.6.3" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.4 Search vendor "Openafs" for product "Openafs" and version "1.6.4" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.5 Search vendor "Openafs" for product "Openafs" and version "1.6.5" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.5.1 Search vendor "Openafs" for product "Openafs" and version "1.6.5.1" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.5.2 Search vendor "Openafs" for product "Openafs" and version "1.6.5.2" | - |
Affected
| ||||||
Openafs Search vendor "Openafs" | Openafs Search vendor "Openafs" for product "Openafs" | 1.6.6 Search vendor "Openafs" for product "Openafs" and version "1.6.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
|