Vulnerability CVE-2018-16949


Published: 2018-09-11   Modified: 2018-09-12

Description:
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.

Type:

CWE-400

(Uncontrolled Resource Consumption ('Resource Exhaustion'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Openafs -> Openafs 
Debian -> Debian linux 

 References:
http://openafs.org/pages/security/OPENAFS-SA-2018-003.txt
http://www.securityfocus.com/bid/106375
https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html
https://www.debian.org/security/2018/dsa-4302

Copyright 2024, cxsecurity.com

 

Back to Top