CVE-2018-16949
moderate-risk
Published 2018-09-12
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.
Do I need to act?
~
4.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (3)
References (8)
Vendor Advisory
http://openafs.org/pages/security/OPENAFS-SA-2018-003.txt
Third Party Advisory
http://www.securityfocus.com/bid/106375
Third Party Advisory
https://www.debian.org/security/2018/dsa-4302
Vendor Advisory
http://openafs.org/pages/security/OPENAFS-SA-2018-003.txt
Third Party Advisory
http://www.securityfocus.com/bid/106375
Third Party Advisory
https://www.debian.org/security/2018/dsa-4302
43
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
8/34 · Low
Exposure
9/34 · Low