Configuration Affecting openafs package, versions <1.4.2-6


Severity

Recommended
medium

Based on Debian security rating.

Threat Intelligence

EPSS
3.87% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-OPENAFS-1555576
  • published20 Mar 2007
  • disclosed20 Mar 2007

Introduced: 20 Mar 2007

CVE-2007-1507  (opens in a new tab)
CWE-16  (opens in a new tab)

How to fix?

Upgrade Debian:12 openafs to version 1.4.2-6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openafs package and not the openafs package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

CVSS Scores

version 3.1