CVE-2018-16947
Published: 12 September 2018
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. The backup tape controller (butc) process accepts incoming RPCs but does not require (or allow for) authentication of those RPCs. Handling those RPCs results in operations being performed with administrator credentials, including dumping/restoring volume contents and manipulating the backup database. For example, an unauthenticated attacker can replace any volume's content with arbitrary data.
Notes
Author | Note |
---|---|
msalvatore | Per the upstream developers, "The in-tree backup suite is not believed to be in common use, so in that sense the impact is limited. Applying a strict firewall policy can also reduce the exposure of the butc to untrusted input and provide some level of remediation." |
Priority
Status
Package | Release | Status |
---|---|---|
openafs Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(1.8.2-1ubuntu0.1)
|
|
eoan |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
focal |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
groovy |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
hirsute |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
impish |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
jammy |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
kinetic |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
lunar |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
mantic |
Not vulnerable
(1.8.4~pre1-1ubuntu2)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(1.8.2-1)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |