Openafs

Openafs

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.77%
  • Veröffentlicht 12.08.2015 14:59:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenAFS before 1.6.13 allows remote attackers to spoof bos commands via unspecified vectors.

  • EPSS 0.47%
  • Veröffentlicht 12.08.2015 14:59:14
  • Zuletzt bearbeitet 12.04.2025 10:46:40

vos in OpenAFS before 1.6.13, when updating VLDB entries, allows remote attackers to obtain stack data by sniffing the network.

  • EPSS 0.6%
  • Veröffentlicht 17.06.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenAFS 1.6.8 does not properly clear the fields in the host structure, which allows remote attackers to cause a denial of service (uninitialized memory access and crash) via unspecified vectors related to TMAY requests.

  • EPSS 0.47%
  • Veröffentlicht 14.04.2014 15:09:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenAFS before 1.6.7 delays the listen thread when an RXS_CheckResponse fails, which allows remote attackers to cause a denial of service (performance degradation) via an invalid packet.

  • EPSS 1.39%
  • Veröffentlicht 14.04.2014 15:09:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument.

  • EPSS 0.28%
  • Veröffentlicht 05.11.2013 21:55:12
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The vos command in OpenAFS 1.6.x before 1.6.5, when using the -encrypt option, only enables integrity protection and sends data in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.

  • EPSS 0.15%
  • Veröffentlicht 05.11.2013 21:55:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenAFS before 1.4.15, 1.6.x before 1.6.5, and 1.7.x before 1.7.26 uses weak encryption (DES) for Kerberos keys, which makes it easier for remote attackers to obtain the service key.

  • EPSS 2.12%
  • Veröffentlicht 14.03.2013 03:13:40
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow.

  • EPSS 2.8%
  • Veröffentlicht 14.03.2013 03:13:37
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry.

  • EPSS 0.66%
  • Veröffentlicht 19.02.2011 01:00:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The afs_linux_lock function in afs/LINUX/osi_vnodeops.c in the kernel module in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions does not properly handle errors, which allows attackers to cause a denial of service via unknown vectors. NOTE...