Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2019.0021
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2019-0021)
Summary:The remote host is missing an update for the 'openafs' package(s) announced via the MGASA-2019-0021 advisory.
Description:Summary:
The remote host is missing an update for the 'openafs' package(s) announced via the MGASA-2019-0021 advisory.

Vulnerability Insight:
Jeffrey Altman reported that the backup tape controller (butc) process
does accept incoming RPCs but does not require (or allow for)
authentication of those RPCs, allowing an unauthenticated attacker to
perform volume operations with administrator credentials
(CVE-2018-16947).

Mark Vitale reported that several RPC server routines do not fully
initialize output variables, leaking memory contents (from both the
stack and the heap) to the remote caller for otherwise-successful RPCs
(CVE-2018-16948).

Mark Vitale reported that an unauthenticated attacker can consume large
amounts of server memory and network bandwidth via specially crafted
requests, resulting in denial of service to legitimate clients
(CVE-2018-16949).

Affected Software/OS:
'openafs' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-16947
Debian Security Information: DSA-4302 (Google Search)
https://www.debian.org/security/2018/dsa-4302
https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-16948
Common Vulnerability Exposure (CVE) ID: CVE-2018-16949
BugTraq ID: 106375
http://www.securityfocus.com/bid/106375
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.