Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1128

Опубликовано: 10 июл. 2018
Источник: debian

Описание

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.19.9-1package
linuxfixed4.9.144-1stretchpackage
linuxignoredjessiepackage
cephfixed12.2.8+dfsg1-1package
cephno-dsajessiepackage

Примечания

  • https://git.kernel.org/linus/6daca13d2e72bedaaacfc08f873114c9307d5aea

  • http://tracker.ceph.com/issues/24836

  • https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 5.9
redhat
больше 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
nvd
больше 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
github
больше 3 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

suse-cvrf
больше 7 лет назад

Security update for ceph