CVE-2024-10394

EUVD-2024-33418
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
openafsopenafs
1.0 ≤
𝑥
< 1.6.25
openafsopenafs
1.8.0 ≤
𝑥
< 1.8.13
openafsopenafs
1.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openafs
bookworm
1.8.9-1+deb12u1
fixed
bookworm (security)
1.8.9-1+deb12u1
fixed
bullseye
vulnerable
bullseye (security)
1.8.6-5+deb11u2
fixed
sid
1.8.14-1
fixed
trixie
1.8.13.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openafs
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
noble
needs-triage
oracular
ignored
plucky
not-affected
questing
not-affected
xenial
needs-triage