Vulnerability CVE-2015-7762


Published: 2015-11-06   Modified: 2015-11-07

Description:
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Openafs -> Openafs 
Debian -> Debian linux 

 References:
http://www.debian.org/security/2015/dsa-3387
http://www.securitytracker.com/id/1034039
https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html
https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15
https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt

Copyright 2024, cxsecurity.com

 

Back to Top