| Vulnerability Name: | CVE-2018-16949 (CCN-149839) | ||||||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-09-11 | ||||||||||||||||||||||||||||||||||||||||||||
| Published: | 2018-09-11 | ||||||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-03-07 | ||||||||||||||||||||||||||||||||||||||||||||
| Summary: | An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections. | ||||||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-400 | ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-16949 Source: CCN Type: OpenAFS Security Advisory-2018-003 Denial of service due to excess resource consumption Source: CONFIRM Type: Vendor Advisory http://openafs.org/pages/security/OPENAFS-SA-2018-003.txt Source: BID Type: Third Party Advisory, VDB Entry 106375 Source: XF Type: UNKNOWN openafs-cve201816949-dos(149839) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20180921 [SECURITY] [DLA 1513-1] openafs security update Source: DEBIAN Type: Third Party Advisory DSA-4302 | ||||||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||||||