Vulnerability Description
The pioctl for the OSD FS command in OpenAFS before 1.6.13 uses the wrong pointer when writing the results of the RPC, which allows local users to cause a denial of service (memory corruption and kernel panic) via a crafted OSD FS command.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openafs | Openafs | <= 1.6.12 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2015/dsa-3320
- http://www.openafs.org/pages/security/OPENAFS-SA-2015-004.txtVendor Advisory
- http://www.securitytracker.com/id/1033262
- https://lists.openafs.org/pipermail/openafs-announce/2015/000486.htmlVendor Advisory
- https://www.openafs.org/dl/openafs/1.6.13/RELNOTES-1.6.13
- http://www.debian.org/security/2015/dsa-3320
- http://www.openafs.org/pages/security/OPENAFS-SA-2015-004.txtVendor Advisory
- http://www.securitytracker.com/id/1033262
- https://lists.openafs.org/pipermail/openafs-announce/2015/000486.htmlVendor Advisory
- https://www.openafs.org/dl/openafs/1.6.13/RELNOTES-1.6.13
FAQ
What is CVE-2015-3285?
CVE-2015-3285 is a vulnerability with a CVSS score of 2.1 (LOW). The pioctl for the OSD FS command in OpenAFS before 1.6.13 uses the wrong pointer when writing the results of the RPC, which allows local users to cause a denial of service (memory corruption and kern...
How severe is CVE-2015-3285?
CVE-2015-3285 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3285?
Check the references section above for vendor advisories and patch information. Affected products include: Openafs Openafs.