Lucene search

K
gentooGentoo FoundationGLSA-201404-05
HistoryApr 07, 2014 - 12:00 a.m.

OpenAFS: Multiple vulnerabilities

2014-04-0700:00:00
Gentoo Foundation
security.gentoo.org
9

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.163 Low

EPSS

Percentile

96.0%

Background

OpenAFS is an client-server program suite for federated file sharing and replicated content distribution.

Description

Multiple vulnerabilities have been discovered in OpenAFS. Please review the CVE identifiers referenced below for details.

Impact

An attacker could potentially execute arbitrary code with the permissions of the user running the AFS server, cause a Denial of Service condition, or gain access to sensitive information. Additionally, an attacker could compromise a cell’s private key, allowing them to impersonate any user in the cell.

Workaround

There is no known workaround at this time.

Resolution

All OpenAFS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.6.5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-fs/openafs< 1.6.5UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.163 Low

EPSS

Percentile

96.0%