Vulnerabilities > CVE-2007-1507 - Configuration vulnerability in Openafs

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
openafs
CWE-16
nessus

Summary

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2007-066.NASL
    descriptionBy default, OpenAFS prior to 1.44 and 1.5.17 supports setuid programs within the local cell, which could allow attackers to obtain privileges. Updated packages have been patched to address this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id24892
    published2007-03-26
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24892
    titleMandrake Linux Security Advisory : openafs (MDKSA-2007:066)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200704-03.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200704-03 (OpenAFS: Privilege escalation) Benjamin Bennett discovered that the OpenAFS client contains a design flaw where cache managers do not use authenticated server connections when performing actions not requested by a user. Impact : If setuid is enabled on the client cells, an attacker can supply a fake FetchStatus reply that sets setuid and root ownership of a file being executed. This could provide root access on the client. Remote attacks may be possible if an attacker can entice a user to execute a known file. Note that setuid is enabled by default in versions of OpenAFS prior to 1.4.4. Workaround : Disable the setuid functionality on all client cells. This is now the default configuration in OpenAFS.
    last seen2020-06-01
    modified2020-06-02
    plugin id24936
    published2007-04-05
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24936
    titleGLSA-200704-03 : OpenAFS: Privilege escalation
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1271.NASL
    descriptionA design error has been identified in the OpenAFS, a cross-platform distributed filesystem included with Debian. OpenAFS historically has enabled setuid filesystem support for the local cell. However, with its existing protocol, OpenAFS can only use encryption, and therefore integrity protection, if the user is authenticated. Unauthenticated access doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id24880
    published2007-03-26
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24880
    titleDebian DSA-1271-1 : openafs - design error