First published: Mon Apr 14 2014(Updated: )
OpenAFS before 1.6.7 delays the listen thread when an RXS_CheckResponse fails, which allows remote attackers to cause a denial of service (performance degradation) via an invalid packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm | <=1.6.6 | |
npm | =1.6.0 | |
npm | =1.6.1 | |
npm | =1.6.2 | |
npm | =1.6.2.1 | |
npm | =1.6.3 | |
npm | =1.6.4 | |
npm | =1.6.5 | |
npm | =1.6.5.1 | |
npm | =1.6.5.2 | |
<=1.6.6 | ||
=1.6.0 | ||
=1.6.1 | ||
=1.6.2 | ||
=1.6.2.1 | ||
=1.6.3 | ||
=1.6.4 | ||
=1.6.5 | ||
=1.6.5.1 | ||
=1.6.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2852 has a medium severity level due to its denial-of-service impact on OpenAFS.
To fix CVE-2014-2852, upgrade OpenAFS to version 1.6.7 or later.
CVE-2014-2852 affects OpenAFS versions prior to 1.6.7, specifically from 1.6.0 to 1.6.6.
CVE-2014-2852 is a denial-of-service vulnerability caused by improper packet handling.
Yes, CVE-2014-2852 can be exploited remotely, allowing attackers to degrade performance through invalid packets.