Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2009-1250
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The cache manager in the client in OpenAFS 1.0 through 1.4.8 and 1.5.0 through 1.5.58, and IBM AFS 3.6 before Patch 19, on Linux allows remote attackers to cause a denial of service (system crash) via an RX response with a large error-code value that is interpreted as a pointer and dereferenced, related to use of the ERR_PTR macro.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenAFS出错代码远程拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenAFS是一套分布式文件系统,它允许系统之间通过局域网和广域网来分享档案和资源。 OpenAFS客户端可能会使用一套将出错代码和指针合并为一个单个值的机制将从文件服务器获得的错误代码直接传送给Linux内核,但这套机制无法区分某些指针的出错代码。当AFS向内核返回这种类型的代码时,内核会将其处理为指针并试图引用。如果攻击者伪造了已有文件服务器的响应或诱骗用户访问了受控的文件服务器,就可以导致客户端崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2009-1250
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2009-1250
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2009-1250

No comments yet


Leave a comment