Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 507420 (CVE-2014-0159) - net-fs/openafs : GetStatistics64 RPC Denial of Service Vulnerability (CVE-2014-0159)
Summary: net-fs/openafs : GetStatistics64 RPC Denial of Service Vulnerability (CVE-201...
Status: RESOLVED FIXED
Alias: CVE-2014-0159
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/57832/
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 544158
Blocks:
  Show dependency tree
 
Reported: 2014-04-11 15:38 UTC by Agostino Sarubbo
Modified: 2015-11-09 22:14 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-04-11 15:38:46 UTC
From ${URL} :

Description

A vulnerability has been reported in OpenAFS, which can be exploited by malicious people to cause a DoS 
(Denial of Service).

An error when handling the GetStatistics64 remote procedure call (RPC) can be exploited to cause a buffer 
overflow and subsequently cause a crash.

The vulnerability is reported in versions 1.4.8 through 1.6.6.


Solution:
Update to version 1.6.7 or apply patch.

Further details available to Secunia VIM customers

Provided and/or discovered by:
The vendor credits Michael Meffie.

Original Advisory:
http://openafs.org/pages/security/OPENAFS-SA-2014-001.txt


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Volkmar Glauche 2014-04-13 19:48:47 UTC
See also bug #500378
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2014-04-28 19:38:32 UTC
CVE-2014-0159 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0159):
  Buffer overflow in the GetStatistics64 remote procedure call (RPC) in
  OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of
  service (crash) via a crafted statsVersion argument.
Comment 3 Adam Feldman gentoo-dev 2015-01-24 01:55:55 UTC
Upstream patch: http://openafs.org/pages/security/openafs-sa-2014-001.patch, tested compilation
Comment 4 Andrew Savchenko gentoo-dev 2015-03-22 21:50:39 UTC
Fixed version 1.6.11 is in tree. Old unstable versions are removed.
Comment 5 Andrew Savchenko gentoo-dev 2015-03-22 22:00:17 UTC
Arch teams, please stabilize =net-fs/openafs-1.6.11.
Comment 6 Agostino Sarubbo gentoo-dev 2015-03-24 08:59:59 UTC
stabilization done in bug 536272
Comment 7 Andrew Savchenko gentoo-dev 2015-03-25 02:41:13 UTC
All vulnerable versions are removed from tree.
Comment 8 Stefan Behte (RETIRED) gentoo-dev Security 2015-11-09 22:09:32 UTC
Vote: NO.
Comment 9 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-11-09 22:14:09 UTC
GLSA Vote: No