7.8
CVSSv2

CVE-2017-17432

Published: 06/12/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

OpenAFS 1.x prior to 1.6.22 does not properly validate Rx ack packets, which allows remote malicious users to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.

Vulnerable Product Search on Vulmon Subscribe to Product

openafs openafs

debian debian linux 9.0

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #883602 openafs: CVE-2017-17432: OPENAFS-SA-2017-001: Rx assertion failure from insufficient input validation Package: src:openafs; Maintainer for src:openafs is Benjamin Kaduk <kaduk@mitedu>; Reported by: Benjamin Kaduk <kaduk@mitedu> Date: Tue, 5 Dec 2017 16:03:07 UTC Severity: important ...
Debian Bug report logs - #846922 CVE-2016-9772 - directory information leaks Package: openafs; Maintainer for openafs is Benjamin Kaduk <kaduk@mitedu>; Reported by: Guido Günther <agx@sigxcpuorg> Date: Sun, 4 Dec 2016 11:12:02 UTC Severity: important Tags: fixed-upstream, security, upstream Found in versions 16 ...
It was discovered that malformed jumbogram packets could result in denial of service against OpenAFS, an implementation of the Andrew distributed file system For the oldstable distribution (jessie), this problem has been fixed in version 169-2+deb8u6 This update also provides corrections for CVE-2016-4536 and CVE-2016-9772 For the stable distr ...