Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p847-p2jr-v5qq

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

EPSS

Процентиль: 64%
0.00472
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 10 лет назад

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

nvd
больше 10 лет назад

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

debian
больше 10 лет назад

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not prop ...

EPSS

Процентиль: 64%
0.00472
Низкий

Дефекты

CWE-200