rx/rx.c in OpenAFS prior to 1.6.15 and 1.7.x prior to 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote malicious users to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openafs openafs 1.7.13 |
||
openafs openafs 1.7.14 |
||
openafs openafs 1.7.20 |
||
openafs openafs 1.7.21 |
||
openafs openafs 1.7.28 |
||
openafs openafs 1.7.29 |
||
openafs openafs |
||
openafs openafs 1.7.1 |
||
openafs openafs 1.7.10 |
||
openafs openafs 1.7.17 |
||
openafs openafs 1.7.19 |
||
openafs openafs 1.7.24 |
||
openafs openafs 1.7.25 |
||
openafs openafs 1.7.4 |
||
openafs openafs 1.7.8 |
||
openafs openafs 1.7.15 |
||
openafs openafs 1.7.16 |
||
openafs openafs 1.7.22 |
||
openafs openafs 1.7.23 |
||
openafs openafs 1.7.3 |
||
openafs openafs 1.7.30 |
||
openafs openafs 1.7.31 |
||
openafs openafs 1.7.11 |
||
openafs openafs 1.7.12 |
||
openafs openafs 1.7.18 |
||
openafs openafs 1.7.2 |
||
openafs openafs 1.7.26 |
||
openafs openafs 1.7.27 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |