Lucene search

K
osvGoogleOSV:DLA-342-1
HistoryNov 18, 2015 - 12:00 a.m.

openafs - security update

2015-11-1800:00:00
Google
osv.dev
10

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

79.4%

Several vulnerabilities have been found and solved in the distributed file
system OpenAFS:

  • CVE-2015-3282
    vos leaked stack data clear on the wire when updating vldb entries.
  • CVE-2015-3283
    OpenAFS allowed remote attackers to spoof bos commands via unspecified
    vectors.
  • CVE-2015-3285
    pioctl wrongly used the pointer related to the RPC, allowing local users to
    cause a denial of service (memory corruption and kernel panic) via a
    crafted OSD FS command.
  • CVE-2015-6587
    vlserver allowed remote authenticated users to cause a denial of service
    (out-of-bounds read and crash) via a crafted regular expression in a
    VL_ListAttributesN2 RPC.
  • CVE-2015-7762 and CVE-2015-7763 (“Tattletale”)

John Stumpo found that Rx ACK packets leaked plaintext of packets
previously processed.

For Debian 6 Squeeze, these problems have been fixed in openafs version
1.4.12.1+dfsg-4+squeeze4.

We recommend that you upgrade your OpenAFS packages.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

79.4%