Your submission was sent successfully! Close

CVE-2018-16947

Published: 12 September 2018

An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. The backup tape controller (butc) process accepts incoming RPCs but does not require (or allow for) authentication of those RPCs. Handling those RPCs results in operations being performed with administrator credentials, including dumping/restoring volume contents and manipulating the backup database. For example, an unauthenticated attacker can replace any volume's content with arbitrary data.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
openafs
Launchpad, Ubuntu, Debian
Upstream
Released (1.8.2-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(1.8.4~pre1-1ubuntu2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.8.4~pre1-1ubuntu2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1.8.4~pre1-1ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needs-triage)

Notes

AuthorNote
msalvatore
Per the upstream developers, "The in-tree backup suite is not believed to be in common
use, so in that sense the impact is limited.  Applying a strict firewall
policy can also reduce the exposure of the butc to untrusted input and
provide some level of remediation."

References

Bugs