Описание
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.6.15-1 |
| esm-apps/xenial | not-affected | 1.6.15-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.6.7-1ubuntu1.1]] |
| precise | released | 1.6.1-1+ubuntu0.7 |
| trusty | released | 1.6.7-1ubuntu1.1 |
| trusty/esm | DNE | trusty was released [1.6.7-1ubuntu1.1] |
| upstream | released | 1.6.15-1 |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not prop ...
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
5 Medium
CVSS2