5
CVSSv2

CVE-2018-16949

Published: 12/09/2018 Updated: 07/03/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in OpenAFS prior to 1.6.23 and 1.8.x prior to 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openafs openafs

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #908616 OpenAFS security release Package: src:openafs; Maintainer for src:openafs is Benjamin Kaduk <kaduk@mitedu>; Reported by: Benjamin Kaduk <kaduk@mitedu> Date: Tue, 11 Sep 2018 19:39:01 UTC Severity: serious Tags: security Found in versions openafs/169-1, openafs/169-2+deb8u7 Fixe ...
Several vulnerabilities were discovered in openafs, an implementation of the distributed filesystem AFS The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-16947 Jeffrey Altman reported that the backup tape controller (butc) process does accept incoming RPCs but does not require (or allow for) ...