FreeBSD : openafs -- information disclosure (017a493f-7db6-11e5-a762-14dae9d210b8)

medium Nessus Plugin ID 86645


The remote FreeBSD host is missing a security-related update.


The OpenAFS development team reports :

When constructing an Rx acknowledgment (ACK) packet, Andrew-derived Rx implementations do not initialize three octets of data that are padding in the C language structure and were inadvertently included in the wire protocol (CVE-2015-7762). Additionally, OpenAFS Rx in versions 1.5.75 through 1.5.78, 1.6.0 through 1.6.14, and 1.7.0 through 1.7.32 include a variable-length padding at the end of the ACK packet, in an attempt to detect the path MTU, but only four octets of the additional padding are initialized (CVE-2015-7763).


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 86645

File Name: freebsd_pkg_017a493f7db611e5a76214dae9d210b8.nasl

Version: 2.5

Type: local

Published: 10/29/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:openafs, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/28/2015

Vulnerability Publication Date: 10/28/2015

Reference Information

CVE: CVE-2015-7762, CVE-2015-7763