Total vulnerabilities in the database
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
Software | From | Fixed in |
---|---|---|
openafs / openafs | 1.4.4 | 1.4.4.x |
openafs / openafs | 1.4.3 | 1.4.3.x |
openafs / openafs | 1.4.0 | 1.4.0.x |
openafs / openafs | 1.5.6 | 1.5.6.x |
openafs / openafs | 1.4.2 | 1.4.2.x |
openafs / openafs | 1.5.13 | 1.5.13.x |
openafs / openafs | 1.5.3 | 1.5.3.x |
openafs / openafs | 1.5.5 | 1.5.5.x |
openafs / openafs | 1.5.12 | 1.5.12.x |
openafs / openafs | 1.5.1 | 1.5.1.x |
openafs / openafs | 1.5.15 | 1.5.15.x |
openafs / openafs | 1.5.8 | 1.5.8.x |
openafs / openafs | 1.5.16 | 1.5.16.x |
openafs / openafs | 1.5.14 | 1.5.14.x |
openafs / openafs | 1.5.9 | 1.5.9.x |
openafs / openafs | 1.5.10 | 1.5.10.x |
openafs / openafs | 1.5.0 | 1.5.0.x |
openafs / openafs | 1.5.2 | 1.5.2.x |
openafs / openafs | 1.4.1 | 1.4.1.x |
openafs / openafs | 1.5.11 | 1.5.11.x |
openafs / openafs | 1.5.7 | 1.5.7.x |