OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
References
Link | Resource |
---|---|
https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt | Vendor Advisory |
https://bugs.debian.org/883602 | Issue Tracking Mailing List Third Party Advisory |
https://www.debian.org/security/2017/dsa-4067 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html |
Information
Published : 2017-12-05 16:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-17432
Mitre link : CVE-2017-17432
JSON object : View
CWE
CWE-617
Reachable Assertion
Products Affected
debian
- debian_linux
openafs
- openafs