Summary
The remote host is missing an update to openafs
announced via advisory DSA 1768-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201768-1
Insight
Two vulnerabilities were discovered in the client part of OpenAFS, a distributed file system.
An attacker with control of a file server or the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding.
(CVE-2009-1251)
An attacker with control of a file server or the ability to forge RX packets may crash OpenAFS clients because of wrongly handled error return codes in the kernel module. (CVE-2009-1250).
Note that in order to apply this security update, you must rebuild the OpenAFS kernel module. Be sure to also upgrade openafs-modules-source, build a new kernel module for your system following the instructions in /usr/share/doc/openafs-client/README.modules.gz, and then either stop and restart openafs-client or reboot the system to reload the kernel module.
For the old stable distribution (etch), these problems have been fixed in version 1.4.2-6etch2.
For the stable distribution (lenny), these problems have been fixed in version 1.4.7.dfsg1-6+lenny1.
For the unstable distribution (sid), these problems have been fixed in version 1.4.10+dfsg1-1.
We recommend that you upgrade your openafs packages.
Severity
Classification
-
CVE CVE-2009-1250, CVE-2009-1251 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities