First published: Tue Nov 05 2013(Updated: )
The vos command in OpenAFS 1.6.x before 1.6.5, when using the -encrypt option, only enables integrity protection and sends data in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm | =1.6.0 | |
npm | =1.6.1 | |
npm | =1.6.2 | |
npm | =1.6.2.1 | |
npm | =1.6.3 | |
npm | =1.6.4 | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4135 is rated as a medium severity vulnerability due to the risk of sensitive information being exposed.
To mitigate CVE-2013-4135, upgrade OpenAFS to version 1.6.5 or later where the vulnerability has been addressed.
CVE-2013-4135 affects OpenAFS versions 1.6.0 through 1.6.4 as well as Debian Linux 7.0 using these OpenAFS versions.
CVE-2013-4135 allows remote attackers to sniff network traffic and obtain sensitive information due to the use of cleartext data transmission.
There is no recommended workaround for CVE-2013-4135; the best course of action is to upgrade to a secure version of OpenAFS.