CVE-2024-10397

7.8 HIGH

📋 TL;DR

CVE-2024-10397 is a memory corruption vulnerability in OpenAFS client utilities where a malicious AFS server can crash the cache manager or potentially execute arbitrary code on client systems. This affects all OpenAFS clients connecting to untrusted AFS servers. The vulnerability stems from improper bounds checking when processing server responses.

💻 Affected Systems

Products:
  • OpenAFS
Versions: All versions before 1.8.15 and 1.6.35
Operating Systems: Linux, Unix-like systems, Windows (via OpenAFS ports)
Default Config Vulnerable: ⚠️ Yes
Notes: All OpenAFS client installations using the cache manager are vulnerable when connecting to AFS servers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on client systems, allowing attackers to gain full control of affected machines when connecting to a malicious AFS server.

🟠

Likely Case

Denial of service through client crashes, disrupting AFS file access and potentially affecting system stability.

🟢

If Mitigated

Limited to denial of service if exploit attempts fail or systems have additional memory protection mechanisms.

🌐 Internet-Facing: MEDIUM - Requires connecting to malicious AFS servers, which are less common than web services but still accessible.
🏢 Internal Only: HIGH - Internal AFS servers could be compromised to attack clients across the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires controlling an AFS server that clients connect to, but no authentication is needed once the malicious server is in the communication path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenAFS 1.8.15 and 1.6.35

Vendor Advisory: https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt

Restart Required: Yes

Instructions:

1. Download OpenAFS 1.8.15 or 1.6.35 from openafs.org. 2. Stop all AFS services. 3. Install the updated packages. 4. Restart AFS services and reboot systems if kernel modules were updated.

🔧 Temporary Workarounds

Restrict AFS Server Connections

linux

Configure clients to only connect to trusted AFS servers using access control lists or firewall rules.

iptables -A OUTPUT -p udp --dport 7000:7003 -d trusted_afs_server_ip -j ACCEPT
iptables -A OUTPUT -p udp --dport 7000:7003 -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to isolate AFS traffic and prevent connections to untrusted servers.
  • Deploy host-based intrusion detection to monitor for crash patterns in OpenAFS processes.

🔍 How to Verify

Check if Vulnerable:

Check OpenAFS version with 'afsversion' or examine package version: 'dpkg -l openafs-client' on Debian/Ubuntu, 'rpm -q openafs' on RHEL.

Check Version:

afsversion || dpkg -l openafs-client 2>/dev/null || rpm -q openafs 2>/dev/null

Verify Fix Applied:

Confirm version is 1.8.15 or 1.6.35 or higher using the same commands.

📡 Detection & Monitoring

Log Indicators:

  • OpenAFS cache manager crashes in system logs
  • Segmentation fault errors in /var/log/messages or syslog

Network Indicators:

  • Unusual AFS protocol traffic from unexpected servers
  • Spike in AFS connection attempts to new IPs

SIEM Query:

source="*syslog*" AND ("OpenAFS" AND ("segmentation fault" OR "crash" OR "SIGSEGV"))

🔗 References

📤 Share & Export