Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument.
References
Link | Resource |
---|---|
http://www.debian.org/security/2014/dsa-2899 | Third Party Advisory |
http://www.openafs.org/frameset/dl/openafs/1.6.7/ChangeLog | Issue Tracking Release Notes |
http://secunia.com/advisories/57832 | Permissions Required Third Party Advisory |
http://secunia.com/advisories/57779 | Permissions Required Third Party Advisory |
http://openafs.org/pages/security/OPENAFS-SA-2014-001.txt | Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 | Broken Link |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-04-14 08:09
Updated : 2016-08-24 08:32
NVD link : CVE-2014-0159
Mitre link : CVE-2014-0159
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
debian
- debian_linux
openafs
- openafs