[OpenAFS-announce] OpenAFS Security Advisory 2014-002

Stephan Wiesand openafs-info@openafs.org
Thu, 12 Jun 2014 19:44:34 +0200


Topic: Use of uninitialized memory in OpenAFS fileserver


Issued:         12-June-2014
Last Update:    12-June-2014
Affected:       OpenAFS file servers running version 1.6.8

An attacker with the ability to connect to an OpenAFS fileserver
over the network can trigger the use of uninitialized memory and,
potentially, execution of arbitrary code with the privileges of
the fileserver process.

Clients are not affected.


SUMMARY
=======

The 1.6.8 release of the OpenAFS fileserver and dafileserver
processes introduced a security vulnerability in the host package
due to the use of uninitialized memory allocations from the process
heap.


IMPACT
======

New client connections to the fileserver can result in unexpected
termination of the service.  As a side-effect of service termination
callback state information and data not yet flushed to disk can be
lost.

An attacker with the ability to connect to an OpenAFS fileserver over
the network can trigger the use of uninitialized memory and,
potentially,  execution of arbitrary code with the privileges of the
fileserver process.


AFFECTED SOFTWARE
=================

The fileserver and dafileserver executables in release 1.6.8 of OpenAFS
only. Clients and database server processes are unaffected.


FIXES
=====

The OpenAFS project recommends that administrators of fileservers upgrade
to OpenAFS version 1.6.9 or newer.

For those sites unable, or unwilling, to upgrade a patch which resolves this
issue is available directly from:

 http://www.openafs.org/security/openafs-sa-2014-002.patch

The latest stable OpenAFS release is always available from
  http://www.openafs.org/release/latest.html

This announcement and code patches related to it may be found on the
OpenAFS security advisory page at:

 http://www.openafs.org/security/

The main OpenAFS web page is at:

 http://www.openafs.org/


ACKNOWLEDGEMENTS
================

This issue was reported by Andrew Deason.