Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2019.0021
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2019-0021)
Resumen:The remote host is missing an update for the 'openafs' package(s) announced via the MGASA-2019-0021 advisory.
Descripción:Summary:
The remote host is missing an update for the 'openafs' package(s) announced via the MGASA-2019-0021 advisory.

Vulnerability Insight:
Jeffrey Altman reported that the backup tape controller (butc) process
does accept incoming RPCs but does not require (or allow for)
authentication of those RPCs, allowing an unauthenticated attacker to
perform volume operations with administrator credentials
(CVE-2018-16947).

Mark Vitale reported that several RPC server routines do not fully
initialize output variables, leaking memory contents (from both the
stack and the heap) to the remote caller for otherwise-successful RPCs
(CVE-2018-16948).

Mark Vitale reported that an unauthenticated attacker can consume large
amounts of server memory and network bandwidth via specially crafted
requests, resulting in denial of service to legitimate clients
(CVE-2018-16949).

Affected Software/OS:
'openafs' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2018-16947
Debian Security Information: DSA-4302 (Google Search)
https://www.debian.org/security/2018/dsa-4302
https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-16948
Common Vulnerability Exposure (CVE) ID: CVE-2018-16949
BugTraq ID: 106375
http://www.securityfocus.com/bid/106375
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.