FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

openafs -- information disclosure

Affected packages
openafs < 1.6.15

Details

VuXML ID 017a493f-7db6-11e5-a762-14dae9d210b8
Discovery 2015-10-28
Entry 2015-10-28

The OpenAFS development team reports:

When constructing an Rx acknowledgment (ACK) packet, Andrew-derived Rx implementations do not initialize three octets of data that are padding in the C language structure and were inadvertently included in the wire protocol (CVE-2015-7762). Additionally, OpenAFS Rx in versions 1.5.75 through 1.5.78, 1.6.0 through 1.6.14, and 1.7.0 through 1.7.32 include a variable-length padding at the end of the ACK packet, in an attempt to detect the path MTU, but only four octets of the additional padding are initialized (CVE-2015-7763).

References

CVE Name CVE-2015-7762
CVE Name CVE-2015-7763
URL http://openafs.org/pages/security/OPENAFS-SA-2015-007.txt