CVE-2019-18603

Current Description

OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer.

Basic Data

PublishedOctober 29, 2019
Last ModifiedNovember 06, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOpenafsOpenafs********1.6.24
    2.3ApplicationOpenafsOpenafs********1.8.01.8.5

Vulnerable Software List

VendorProductVersions
Openafs Openafs *

References

NameSourceURLTags
[debian-lts-announce] 20191106 [SECURITY] [DLA 1982-1] openafs security updatehttps://lists.debian.org/debian-lts-announce/2019/11/msg00002.htmlMLIST
https://openafs.org/pages/security/OPENAFS-SA-2019-001.txthttps://openafs.org/pages/security/OPENAFS-SA-2019-001.txtMISCVendor Advisory