Vulnerability Description
The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openafs | Openafs | <= 1.6.12 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2015/dsa-3320
- http://www.openafs.org/pages/security/OPENAFS-SA-2015-006.txtVendor Advisory
- https://lists.openafs.org/pipermail/openafs-announce/2015/000486.htmlVendor Advisory
- https://www.openafs.org/dl/openafs/1.6.13/RELNOTES-1.6.13
- http://www.debian.org/security/2015/dsa-3320
- http://www.openafs.org/pages/security/OPENAFS-SA-2015-006.txtVendor Advisory
- https://lists.openafs.org/pipermail/openafs-announce/2015/000486.htmlVendor Advisory
- https://www.openafs.org/dl/openafs/1.6.13/RELNOTES-1.6.13
FAQ
What is CVE-2015-6587?
CVE-2015-6587 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.
How severe is CVE-2015-6587?
CVE-2015-6587 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6587?
Check the references section above for vendor advisories and patch information. Affected products include: Openafs Openafs, Debian Debian Linux.