Vulnerability Name: | CVE-2018-16948 (CCN-149838) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-09-11 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-09-11 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-11-19 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-16948 Source: CCN Type: OpenAFS Security Advisory-2018-002 information leakage from uninitialized RPC output variables Source: CONFIRM Type: Vendor Advisory http://openafs.org/pages/security/OPENAFS-SA-2018-002.txt Source: XF Type: UNKNOWN openafs-cve201816948-info-disc(149838) Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20180921 [SECURITY] [DLA 1513-1] openafs security update Source: DEBIAN Type: Third Party Advisory DSA-4302 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |