First published: Wed Aug 12 2015(Updated: )
vos in OpenAFS before 1.6.13, when updating VLDB entries, allows remote attackers to obtain stack data by sniffing the network.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm | <=1.6.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3282 has been classified as a medium severity vulnerability due to its potential impact on data confidentiality.
The recommended fix for CVE-2015-3282 is to upgrade OpenAFS to version 1.6.13 or later to mitigate the vulnerability.
CVE-2015-3282 affects users of OpenAFS versions prior to 1.6.13, particularly those who utilize VLDB entries.
CVE-2015-3282 allows remote attackers to obtain sensitive stack data by sniffing the network traffic.
Yes, if you are using version 1.6.12 or earlier of OpenAFS, you are at risk from CVE-2015-3282 and should upgrade immediately.