Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA142] DSA-142-1 openafs

Vulnerability Assessment Details

[DSA142] DSA-142-1 openafs

Vulnerability Assessment Summary
DSA-142-1 openafs

Detailed Explanation for this Vulnerability Assessment

An integer overflow bug has been discovered in the RPC library used by
the OpenAFS database server, which is derived from the SunRPC library.
This bug could be exploited to crash certain OpenAFS servers
(volserver, vlserver, ptserver, buserver) or to obtain unauthorized
root access to a host running one of these processes. No exploits are
known to exist yet.
This problem has been fixed in version 1.2.3final2-6 for the current
stable distribution (woody) and in version 1.2.6-1 for the unstable
distribution (sid). Debian 2.2 (potato) is not affected since it
doesn't contain OpenAFS packages.
OpenAFS is only available for the architectures alpha, i386, powerpc,
s390, sparc. Hence, we only provide fixed packages for these
We recommend that you upgrade your openafs packages.

Solution :
Network Security Threat Level: High

Networks Security ID: 5356

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors


No Discussions have been posted on this vulnerability.