CVE-2015-7763
Summary
| CVE | CVE-2015-7763 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-11-06 21:59:11 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openafs | Openafs | 1.5.75 | All | All | All |
| Application | Openafs | Openafs | 1.5.76 | All | All | All |
| Application | Openafs | Openafs | 1.5.77 | All | All | All |
| Application | Openafs | Openafs | 1.5.78 | All | All | All |
| Application | Openafs | Openafs | 1.6.0 | All | All | All |
| Application | Openafs | Openafs | 1.6.1 | All | All | All |
| Application | Openafs | Openafs | 1.6.10 | All | All | All |
| Application | Openafs | Openafs | 1.6.11 | All | All | All |
| Application | Openafs | Openafs | 1.6.12 | All | All | All |
| Application | Openafs | Openafs | 1.6.13 | All | All | All |
| Application | Openafs | Openafs | 1.6.14 | All | All | All |
| Application | Openafs | Openafs | 1.6.2 | All | All | All |
| Application | Openafs | Openafs | 1.6.2.1 | All | All | All |
| Application | Openafs | Openafs | 1.6.3 | All | All | All |
| Application | Openafs | Openafs | 1.6.4 | All | All | All |
| Application | Openafs | Openafs | 1.6.5 | All | All | All |
| Application | Openafs | Openafs | 1.6.5.1 | All | All | All |
| Application | Openafs | Openafs | 1.6.5.2 | All | All | All |
| Application | Openafs | Openafs | 1.6.6 | All | All | All |
| Application | Openafs | Openafs | 1.6.7 | All | All | All |
| Application | Openafs | Openafs | 1.6.8 | All | All | All |
| Application | Openafs | Openafs | 1.6.9 | All | All | All |
| Application | Openafs | Openafs | 1.7.1 | All | All | All |
| Application | Openafs | Openafs | 1.7.10 | All | All | All |
| Application | Openafs | Openafs | 1.7.11 | All | All | All |
| Application | Openafs | Openafs | 1.7.12 | All | All | All |
| Application | Openafs | Openafs | 1.7.13 | All | All | All |
| Application | Openafs | Openafs | 1.7.14 | All | All | All |
| Application | Openafs | Openafs | 1.7.15 | All | All | All |
| Application | Openafs | Openafs | 1.7.16 | All | All | All |
| Application | Openafs | Openafs | 1.7.17 | All | All | All |
| Application | Openafs | Openafs | 1.7.18 | All | All | All |
| Application | Openafs | Openafs | 1.7.19 | All | All | All |
| Application | Openafs | Openafs | 1.7.2 | All | All | All |
| Application | Openafs | Openafs | 1.7.20 | All | All | All |
| Application | Openafs | Openafs | 1.7.21 | All | All | All |
| Application | Openafs | Openafs | 1.7.22 | All | All | All |
| Application | Openafs | Openafs | 1.7.23 | All | All | All |
| Application | Openafs | Openafs | 1.7.24 | All | All | All |
| Application | Openafs | Openafs | 1.7.25 | All | All | All |
| Application | Openafs | Openafs | 1.7.26 | All | All | All |
| Application | Openafs | Openafs | 1.7.27 | All | All | All |
| Application | Openafs | Openafs | 1.7.28 | All | All | All |
| Application | Openafs | Openafs | 1.7.29 | All | All | All |
| Application | Openafs | Openafs | 1.7.3 | All | All | All |
| Application | Openafs | Openafs | 1.7.30 | All | All | All |
| Application | Openafs | Openafs | 1.7.31 | All | All | All |
| Application | Openafs | Openafs | 1.7.4 | All | All | All |
| Application | Openafs | Openafs | 1.7.8 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-3387-1 openafs | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| OpenAFS Rx Protocol Packet Initialization Flaw Lets Remote Users Obtain Potentially Sensitive Plaintext Information on the Target System - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt | af854a3a-2127-422b-91ae-364da2661108 | www.openafs.org | Vendor Advisory |
| www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15 | af854a3a-2127-422b-91ae-364da2661108 | www.openafs.org | Vendor Advisory |
| [OpenAFS-announce] OpenAFS security release 1.6.15 available | af854a3a-2127-422b-91ae-364da2661108 | lists.openafs.org | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.