Vulnerability Description
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openafs | Openafs | < 1.6.23 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://openafs.org/pages/security/OPENAFS-SA-2018-002.txtVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/09/msg00024.htmlThird Party Advisory
- https://www.debian.org/security/2018/dsa-4302Third Party Advisory
- http://openafs.org/pages/security/OPENAFS-SA-2018-002.txtVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/09/msg00024.htmlThird Party Advisory
- https://www.debian.org/security/2018/dsa-4302Third Party Advisory
FAQ
What is CVE-2018-16948?
CVE-2018-16948 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both...
How severe is CVE-2018-16948?
CVE-2018-16948 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16948?
Check the references section above for vendor advisories and patch information. Affected products include: Openafs Openafs, Debian Debian Linux.