CVE-2018-16947

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-16947
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16947.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-16947
Related
Published
2018-09-12T01:29:00Z
Modified
2025-02-14T23:00:20Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. The backup tape controller (butc) process accepts incoming RPCs but does not require (or allow for) authentication of those RPCs. Handling those RPCs results in operations being performed with administrator credentials, including dumping/restoring volume contents and manipulating the backup database. For example, an unauthenticated attacker can replace any volume's content with arbitrary data.

References

Affected packages

Debian:11 / openafs

Package

Name
openafs
Purl
pkg:deb/debian/openafs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openafs

Package

Name
openafs
Purl
pkg:deb/debian/openafs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openafs

Package

Name
openafs
Purl
pkg:deb/debian/openafs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}