CVE-2015-7762

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://www.debian.org/security/2015/dsa-3387 - () http://www.debian.org/security/2015/dsa-3387 -
References () http://www.securitytracker.com/id/1034039 - () http://www.securitytracker.com/id/1034039 -
References () https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html - Vendor Advisory () https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html - Vendor Advisory
References () https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15 - Vendor Advisory () https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15 - Vendor Advisory
References () https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt - Vendor Advisory () https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt - Vendor Advisory

Information

Published : 2015-11-06 21:59

Updated : 2024-11-21 02:37


NVD link : CVE-2015-7762

Mitre link : CVE-2015-7762

CVE.ORG link : CVE-2015-7762


JSON object : View

Products Affected

debian

  • debian_linux

openafs

  • openafs
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor