Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-7763

Опубликовано: 06 нояб. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

РелизСтатусПримечание
devel

not-affected

1.6.15-1
esm-apps/xenial

not-affected

1.6.15-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1.6.7-1ubuntu1.1]]
precise

released

1.6.1-1+ubuntu0.7
trusty

released

1.6.7-1ubuntu1.1
trusty/esm

DNE

trusty was released [1.6.7-1ubuntu1.1]
upstream

released

1.6.15-1
vivid

ignored

end of life
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

5 Medium

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

debian
больше 10 лет назад

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7 ...

github
больше 3 лет назад

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

5 Medium

CVSS2