CVE-2015-7763

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
openafsopenafs
1.5.75
openafsopenafs
1.5.76
openafsopenafs
1.5.77
openafsopenafs
1.5.78
openafsopenafs
1.6.0
openafsopenafs
1.6.1
openafsopenafs
1.6.2
openafsopenafs
1.6.2.1
openafsopenafs
1.6.3
openafsopenafs
1.6.4
openafsopenafs
1.6.5
openafsopenafs
1.6.5.1
openafsopenafs
1.6.5.2
openafsopenafs
1.6.6
openafsopenafs
1.6.7
openafsopenafs
1.6.8
openafsopenafs
1.6.9
openafsopenafs
1.6.10
openafsopenafs
1.6.11
openafsopenafs
1.6.12
openafsopenafs
1.6.13
openafsopenafs
1.6.14
openafsopenafs
1.7.1
openafsopenafs
1.7.2
openafsopenafs
1.7.3
openafsopenafs
1.7.4
openafsopenafs
1.7.8
openafsopenafs
1.7.10
openafsopenafs
1.7.11
openafsopenafs
1.7.12
openafsopenafs
1.7.13
openafsopenafs
1.7.14
openafsopenafs
1.7.15
openafsopenafs
1.7.16
openafsopenafs
1.7.17
openafsopenafs
1.7.18
openafsopenafs
1.7.19
openafsopenafs
1.7.20
openafsopenafs
1.7.21
openafsopenafs
1.7.22
openafsopenafs
1.7.23
openafsopenafs
1.7.24
openafsopenafs
1.7.25
openafsopenafs
1.7.26
openafsopenafs
1.7.27
openafsopenafs
1.7.28
openafsopenafs
1.7.29
openafsopenafs
1.7.30
openafsopenafs
1.7.31
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openafs
bullseye
1.8.6-5
fixed
bookworm
1.8.9-1
fixed
sid
1.8.12.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openafs
xenial
not-affected
wily
ignored
vivid
ignored
trusty
Fixed 1.6.7-1ubuntu1.1
released
precise
Fixed 1.6.1-1+ubuntu0.7
released