CVE-2015-7762
06.11.2015, 21:59
rx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.Enginsight
Vendor | Product | Version |
---|---|---|
openafs | openafs | 𝑥 ≤ 1.6.14.1 |
openafs | openafs | 1.7.1 |
openafs | openafs | 1.7.2 |
openafs | openafs | 1.7.3 |
openafs | openafs | 1.7.4 |
openafs | openafs | 1.7.8 |
openafs | openafs | 1.7.10 |
openafs | openafs | 1.7.11 |
openafs | openafs | 1.7.12 |
openafs | openafs | 1.7.13 |
openafs | openafs | 1.7.14 |
openafs | openafs | 1.7.15 |
openafs | openafs | 1.7.16 |
openafs | openafs | 1.7.17 |
openafs | openafs | 1.7.18 |
openafs | openafs | 1.7.19 |
openafs | openafs | 1.7.20 |
openafs | openafs | 1.7.21 |
openafs | openafs | 1.7.22 |
openafs | openafs | 1.7.23 |
openafs | openafs | 1.7.24 |
openafs | openafs | 1.7.25 |
openafs | openafs | 1.7.26 |
openafs | openafs | 1.7.27 |
openafs | openafs | 1.7.28 |
openafs | openafs | 1.7.29 |
openafs | openafs | 1.7.30 |
openafs | openafs | 1.7.31 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References