The vos command in OpenAFS 1.6.x before 1.6.5, when using the -encrypt option, only enables integrity protection and sends data in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
References
Link | Resource |
---|---|
http://www.debian.org/security/2013/dsa-2729 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 | Broken Link |
http://www.openafs.org/pages/security/OPENAFS-SA-2013-004.txt | Vendor Advisory |
http://www.debian.org/security/2013/dsa-2729 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 | Broken Link |
http://www.openafs.org/pages/security/OPENAFS-SA-2013-004.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2013/dsa-2729 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 - Broken Link | |
References | () http://www.openafs.org/pages/security/OPENAFS-SA-2013-004.txt - Vendor Advisory |
Information
Published : 2013-11-05 21:55
Updated : 2024-11-21 01:54
NVD link : CVE-2013-4135
Mitre link : CVE-2013-4135
CVE.ORG link : CVE-2013-4135
JSON object : View
Products Affected
debian
- debian_linux
openafs
- openafs
CWE
CWE-310
Cryptographic Issues