Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1128

Опубликовано: 10 июл. 2018
Источник: debian
EPSS Низкий

Описание

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.19.9-1package
linuxfixed4.9.144-1stretchpackage
linuxignoredjessiepackage
cephfixed12.2.8+dfsg1-1package
cephno-dsajessiepackage

Примечания

  • https://git.kernel.org/linus/6daca13d2e72bedaaacfc08f873114c9307d5aea

  • http://tracker.ceph.com/issues/24836

  • https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468

EPSS

Процентиль: 81%
0.01584
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 5.9
redhat
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
nvd
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
github
больше 3 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

suse-cvrf
около 7 лет назад

Security update for ceph

EPSS

Процентиль: 81%
0.01584
Низкий