High severity7.5NVD Advisory· Published Dec 6, 2017· Updated May 13, 2026
CVE-2017-17432
CVE-2017-17432
Description
OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
Affected products
3cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- bugs.debian.org/883602nvdIssue TrackingMailing ListThird Party Advisory
- www.debian.org/security/2017/dsa-4067nvdThird Party Advisory
- www.openafs.org/pages/security/OPENAFS-SA-2017-001.txtnvdVendor Advisory
- lists.debian.org/debian-lts-announce/2017/12/msg00016.htmlnvd
News mentions
0No linked articles in our index yet.