CVE-2015-7763

EUVD-2015-7663
rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
Affected Products (NVD)
VendorProductVersion
openafsopenafs
1.5.75
openafsopenafs
1.5.76
openafsopenafs
1.5.77
openafsopenafs
1.5.78
openafsopenafs
1.6.0
openafsopenafs
1.6.1
openafsopenafs
1.6.2
openafsopenafs
1.6.2.1
openafsopenafs
1.6.3
openafsopenafs
1.6.4
openafsopenafs
1.6.5
openafsopenafs
1.6.5.1
openafsopenafs
1.6.5.2
openafsopenafs
1.6.6
openafsopenafs
1.6.7
openafsopenafs
1.6.8
openafsopenafs
1.6.9
openafsopenafs
1.6.10
openafsopenafs
1.6.11
openafsopenafs
1.6.12
openafsopenafs
1.6.13
openafsopenafs
1.6.14
openafsopenafs
1.7.1
openafsopenafs
1.7.2
openafsopenafs
1.7.3
openafsopenafs
1.7.4
openafsopenafs
1.7.8
openafsopenafs
1.7.10
openafsopenafs
1.7.11
openafsopenafs
1.7.12
openafsopenafs
1.7.13
openafsopenafs
1.7.14
openafsopenafs
1.7.15
openafsopenafs
1.7.16
openafsopenafs
1.7.17
openafsopenafs
1.7.18
openafsopenafs
1.7.19
openafsopenafs
1.7.20
openafsopenafs
1.7.21
openafsopenafs
1.7.22
openafsopenafs
1.7.23
openafsopenafs
1.7.24
openafsopenafs
1.7.25
openafsopenafs
1.7.26
openafsopenafs
1.7.27
openafsopenafs
1.7.28
openafsopenafs
1.7.29
openafsopenafs
1.7.30
openafsopenafs
1.7.31
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openafs
bookworm
1.8.9-1
fixed
bullseye
1.8.6-5
fixed
sid
1.8.12.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openafs
precise
Fixed 1.6.1-1+ubuntu0.7
released
trusty
Fixed 1.6.7-1ubuntu1.1
released
vivid
ignored
wily
ignored
xenial
not-affected