First published: Wed Dec 06 2017(Updated: )
OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openafs | 1.8.2-1+deb10u1 1.8.6-5 1.8.9-1 1.8.10-1 | |
npm | >=1.0<1.6.22 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17432 has been classified as a denial of service vulnerability that can lead to system or application crashes.
To fix CVE-2017-17432, upgrade OpenAFS to version 1.6.22 or later.
OpenAFS versions prior to 1.6.22 are affected by CVE-2017-17432.
Yes, CVE-2017-17432 can be exploited remotely by sending crafted Rx ack packets.
CVE-2017-17432 impacts OpenAFS installations on Debian versions 8.0 and 9.0.