Debian DSA-1768-1 : openafs - several vulnerabilities

critical Nessus Plugin ID 36135

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities were discovered in the client part of OpenAFS, a distributed file system.

- CVE-2009-1251 An attacker with control of a file server or the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding.

- CVE-2009-1250 An attacker with control of a file server or the ability to forge RX packets may crash OpenAFS clients because of wrongly handled error return codes in the kernel module.

Note that in order to apply this security update, you must rebuild the OpenAFS kernel module. Be sure to also upgrade openafs-modules-source, build a new kernel module for your system following the instructions in /usr/share/doc/openafs-client/README.modules.gz, and then either stop and restart openafs-client or reboot the system to reload the kernel module.

Solution

Upgrade the openafs packages.

For the old stable distribution (etch), these problems have been fixed in version 1.4.2-6etch2.

For the stable distribution (lenny), these problems have been fixed in version 1.4.7.dfsg1-6+lenny1.

See Also

https://security-tracker.debian.org/tracker/CVE-2009-1251

https://security-tracker.debian.org/tracker/CVE-2009-1250

https://www.debian.org/security/2009/dsa-1768

Plugin Details

Severity: Critical

ID: 36135

File Name: debian_DSA-1768.nasl

Version: 1.16

Type: local

Agent: unix

Published: 4/11/2009

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openafs, cpe:/o:debian:debian_linux:4.0, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 4/10/2009

Reference Information

CVE: CVE-2009-1250, CVE-2009-1251

BID: 34404, 34407

CWE: 119, 189

DSA: 1768