{"api_version":"1","generated_at":"2026-04-23T18:34:38+00:00","cve":"CVE-2016-4536","urls":{"html":"https://cve.report/CVE-2016-4536","api":"https://cve.report/api/cve/CVE-2016-4536.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-4536","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-4536"},"summary":{"title":"CVE-2016-4536","description":"The client in OpenAFS before 1.6.17 does not properly initialize the (1) AFSStoreStatus, (2) AFSStoreVolumeStatus, (3) VldbListByAttributes, and (4) ListAddrByAttributes structures, which might allow remote attackers to obtain sensitive memory information by leveraging access to RPC call traffic.","state":"PUBLIC","assigner":"security@debian.org","published_at":"2016-05-13 16:59:00","updated_at":"2016-05-19 13:40:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html","name":"[OpenAFS-announce] 20160316 OpenAFS security release 1.6.17 available","refsource":"MLIST","tags":["Vendor Advisory"],"title":"[OpenAFS-announce] OpenAFS security release 1.6.17 available","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17","name":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2016-002.txt","name":"https://www.openafs.org/pages/security/OPENAFS-SA-2016-002.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-4536","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4536","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"4536","vulnerable":"1","versionEndIncluding":"1.6.16","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openafs","cpe5":"openafs","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@debian.org","ID":"CVE-2016-4536","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The client in OpenAFS before 1.6.17 does not properly initialize the (1) AFSStoreStatus, (2) AFSStoreVolumeStatus, (3) VldbListByAttributes, and (4) ListAddrByAttributes structures, which might allow remote attackers to obtain sensitive memory information by leveraging access to RPC call traffic."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.openafs.org/pages/security/OPENAFS-SA-2016-002.txt","refsource":"CONFIRM","url":"https://www.openafs.org/pages/security/OPENAFS-SA-2016-002.txt"},{"name":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17","refsource":"CONFIRM","url":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17"},{"name":"[OpenAFS-announce] 20160316 OpenAFS security release 1.6.17 available","refsource":"MLIST","url":"https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html"}]}},"nvd":{"publishedDate":"2016-05-13 16:59:00","lastModifiedDate":"2016-05-19 13:40:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","versionEndIncluding":"1.6.16","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"4536","Ordinal":"90464","Title":"CVE-2016-4536","CVE":"CVE-2016-4536","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"4536","Ordinal":"1","NoteData":"The client in OpenAFS before 1.6.17 does not properly initialize the (1) AFSStoreStatus, (2) AFSStoreVolumeStatus, (3) VldbListByAttributes, and (4) ListAddrByAttributes structures, which might allow remote attackers to obtain sensitive memory information by leveraging access to RPC call traffic.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"4536","Ordinal":"2","NoteData":"2016-05-13","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"4536","Ordinal":"3","NoteData":"2016-05-13","Type":"Other","Title":"Modified"}]}}}