Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-7762

Опубликовано: 06 нояб. 2015
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
Версия до 1.6.14.1 (включая)
cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

EPSS

Процентиль: 64%
0.00472
Низкий

5 Medium

CVSS2

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 10 лет назад

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

debian
больше 10 лет назад

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not prop ...

github
больше 3 лет назад

rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

EPSS

Процентиль: 64%
0.00472
Низкий

5 Medium

CVSS2

Дефекты

CWE-200