CVE-2015-7762

NameCVE-2015-7762
Descriptionrx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-342-1, DSA-3387-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openafs (PTS)wheezy1.6.1-3+deb7u5fixed
wheezy (security)1.6.1-3+deb7u7fixed
jessie (security), jessie1.6.9-2+deb8u5fixed
stretch1.6.20-2fixed
buster, sid1.6.21-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openafssource(unstable)1.6.15-1medium
openafssourcejessie1.6.9-2+deb8u4mediumDSA-3387-1
openafssourcesqueeze1.4.12.1+dfsg-4+squeeze4mediumDLA-342-1
openafssourcewheezy1.6.1-3+deb7u5mediumDSA-3387-1

Notes

https://www.openafs.org/security

Search for package or bug name: Reporting problems