Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10222

Опубликовано: 08 нояб. 2019
Источник: debian

Описание

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cephfixed14.2.4-1package
cephnot-affectedstretchpackage
cephnot-affectedjessiepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2019/08/28/9

  • https://github.com/ceph/ceph/pull/29967

  • https://github.com/ceph/ceph/commit/6171399fdedd928b4249d135b4036e3de25079aa

  • 12.2.x installations only affected by the vulnerability if experimental

  • features are enabled.

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

CVSS3: 7.5
redhat
больше 6 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

CVSS3: 7.5
nvd
около 6 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

suse-cvrf
больше 6 лет назад

Security update for ceph

CVSS3: 7.5
github
больше 3 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.