CVE-2009-1250

The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:ibm:afs:*:patch18:*:*:*:*:*:*
cpe:2.3:a:ibm:afs:3.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:afs:3.6:patch12:*:*:*:*:*:*
cpe:2.3:a:ibm:afs:3.6:patch13:*:*:*:*:*:*
cpe:2.3:a:ibm:afs:3.6:patch14:*:*:*:*:*:*
cpe:2.3:a:ibm:afs:3.6:patch15:*:*:*:*:*:*
cpe:2.3:a:ibm:afs:3.6:patch16:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.0.4a:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.1.1a:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.2a:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.2b:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.70:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.74:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.77:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.3.81:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.7_pre5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8_pre1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8_pre2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.8_pre3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://secunia.com/advisories/34655 - () http://secunia.com/advisories/34655 -
References () http://secunia.com/advisories/34684 - () http://secunia.com/advisories/34684 -
References () http://secunia.com/advisories/36310 - () http://secunia.com/advisories/36310 -
References () http://secunia.com/advisories/42896 - () http://secunia.com/advisories/42896 -
References () http://security.gentoo.org/glsa/glsa-201101-05.xml - () http://security.gentoo.org/glsa/glsa-201101-05.xml -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21396389 - () http://www-01.ibm.com/support/docview.wss?uid=swg21396389 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg1ID71123 - () http://www-1.ibm.com/support/docview.wss?uid=swg1ID71123 -
References () http://www.debian.org/security/2009/dsa-1768 - () http://www.debian.org/security/2009/dsa-1768 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 -
References () http://www.openafs.org/security/OPENAFS-SA-2009-002.txt - () http://www.openafs.org/security/OPENAFS-SA-2009-002.txt -
References () http://www.openafs.org/security/openafs-sa-2009-002.patch - Exploit () http://www.openafs.org/security/openafs-sa-2009-002.patch - Exploit
References () http://www.securityfocus.com/bid/34404 - () http://www.securityfocus.com/bid/34404 -
References () http://www.vupen.com/english/advisories/2009/0984 - () http://www.vupen.com/english/advisories/2009/0984 -
References () http://www.vupen.com/english/advisories/2011/0117 - () http://www.vupen.com/english/advisories/2011/0117 -

Information

Published : 2009-04-09 00:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1250

Mitre link : CVE-2009-1250

CVE.ORG link : CVE-2009-1250


JSON object : View

Products Affected

ibm

  • afs

linux

  • linux_kernel

openafs

  • openafs
CWE
CWE-189

Numeric Errors