Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3821

Опубликовано: 27 мар. 2019
Источник: debian
EPSS Низкий

Описание

A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cephnot-affectedpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1656852

  • https://github.com/ceph/civetweb/pull/33

EPSS

Процентиль: 75%
0.00889
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.

CVSS3: 7.5
redhat
около 7 лет назад

A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.

CVSS3: 7.5
nvd
около 7 лет назад

A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.

CVSS3: 7.5
github
почти 4 года назад

A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.

CVSS3: 7.5
fstec
больше 7 лет назад

Уязвимость веб-сервера CivetWeb, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 75%
0.00889
Низкий