CVE-2018-16949

An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-09-12 01:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-16949

Mitre link : CVE-2018-16949

CVE.ORG link : CVE-2018-16949


JSON object : View

Products Affected

openafs

  • openafs

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption