Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14654

Опубликовано: 31 окт. 2018
Источник: debian
EPSS Низкий

Описание

The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glusterfsfixed5.1-1package
glusterfsnot-affectedjessiepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2018/10/31/5

  • https://bugzilla.redhat.com/show_bug.cgi?id=1631576

  • https://review.gluster.org/#/c/glusterfs/+/21534/

  • http://git.gluster.org/cgit/glusterfs.git/commit/?id=5f4ae8a80543332a2e92dfa5c7f833ae7b93a664 (release-4.1)

  • http://git.gluster.org/cgit/glusterfs.git/commit/?id=dc775c4ae052d1e9d0f61ace3be999f73f0ffa23 (release-5)

EPSS

Процентиль: 83%
0.02023
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.

CVSS3: 5.4
redhat
больше 7 лет назад

The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.

CVSS3: 6.5
nvd
больше 7 лет назад

The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.

CVSS3: 6.5
github
больше 3 лет назад

The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.

EPSS

Процентиль: 83%
0.02023
Низкий