First published: Wed Sep 12 2018(Updated: )
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm | <1.6.23 | |
npm | >=1.8.0<1.8.2 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16949 is classified as a high severity vulnerability due to its potential for unauthenticated remote code execution.
To fix CVE-2018-16949, upgrade OpenAFS to version 1.6.23 or 1.8.2 or later.
CVE-2018-16949 affects OpenAFS versions before 1.6.23 and 1.8.x before 1.8.2, as well as Debian Linux versions 8.0 and 9.0.
An attacker can exploit CVE-2018-16949 by sending maliciously large RPC input values to the server.
CVE-2018-16949 is vulnerable to unauthenticated attacks, meaning attackers do not need to be authenticated to exploit the vulnerability.