SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   OpenAFS Vendors:   OpenAFS.org
OpenAFS Multiple Flaws Let Remote Users Spoof Commands and Obtain Potentially Sensitive Information and Local Users Deny Service and Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1033262
SecurityTracker URL:  http://securitytracker.com/id/1033262
CVE Reference:   CVE-2015-3282, CVE-2015-3283, CVE-2015-3284, CVE-2015-3285, CVE-2015-3286, CVE-2015-3287   (Links to External Site)
Date:  Aug 12 2015
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.0 - 1.6.12
Description:   Multiple vulnerabilities were reported in OpenAFS. A local user can cause denial of service conditions on the target system. A local or remote user can obtain potentially sensitive information from system memory. A remote user can spoof commands.

The system does not properly clear memory allocated for Volume Location Database (VLDB) entry structures. When VLDB entries are created, a remote user that is monitoring the network can obtain stack data [CVE-2015-3282].

The Basic OverSeer (BOS) server uses clear text for command messages [CVE-2015-3283]. A remote user can spoof commands to modify the server state on systems where restricted mode is not enabled.

A local user can supply a specially crafted pioctl command to obtain portions of kernel memory [CVE-2015-3284].

A local user can supply a specially crafted Object Storage Device (OSD) command to trigger a kernel panic [CVE-2015-3285].

A local user can trigger a buffer overflow in the Solaris kernel extension by modifying a grouplist for process authentication groups (PAGs) [CVE-2015-3286].

A local user can supply a specially crafted regular expression to trigger a buffer overflow in the OpenAFS vlserver and cause the service to crash [CVE-2015-3287].

Impact:   A local user can cause denial of service conditions on the target system.

A remote or local user can obtain potentially sensitive information on the target system.

A remote user can spoof commands on the target system.

Solution:   The vendor has issued a fix (1.6.13).

The vendor's advisories are available at:

http://www.openafs.org/security/OPENAFS-SA-2015-001.txt
http://www.openafs.org/security/OPENAFS-SA-2015-002.txt
http://www.openafs.org/security/OPENAFS-SA-2015-003.txt
http://www.openafs.org/security/OPENAFS-SA-2015-004.txt
http://www.openafs.org/security/OPENAFS-SA-2015-005.txt
http://www.openafs.org/security/OPENAFS-SA-2015-006.txt

Vendor URL:  www.openafs.org/security/OPENAFS-SA-2015-001.txt (Links to External Site)
Cause:   Access control error, Authentication error, Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC