CVE-2017-17432
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
HIGH
7,8
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: complete
Description
AI Translation Available
OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0124
Percentile
0,8th
Updated
EPSS Score Trend (Last 91 Days)
617
Reachable Assertion
DraftCommon Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Crash, Exit, Or Restart
Applicable Platforms
Languages:
C, Java, Not Language-Specific, Rust
Application
Openafs by Openafs
Version Range Affected
From
1.0
(inclusive)
To
1.6.22
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bugs.debian.org/883602
https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html
https://www.debian.org/security/2017/dsa-4067
https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt
https://bugs.debian.org/883602
https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html
https://www.debian.org/security/2017/dsa-4067
https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt