Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-1700

Опубликовано: 07 фев. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cephfixed14.2.7-1package
cephnot-affectedstretchpackage
cephnot-affectedjessiepackage

Примечания

  • https://tracker.ceph.com/issues/42531

  • https://github.com/ceph/ceph/pull/33017

  • https://github.com/ceph/ceph/commit/ff72c50a2c43c57aead933eb4903ad1ca6d1748a

EPSS

Процентиль: 55%
0.00326
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 6 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.5
redhat
около 6 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.5
nvd
почти 6 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.3
fstec
около 6 лет назад

Уязвимость метода rgw::asio::ClientIO из rgw/rgw_asio_frontend.cc системы хранения данных Ceph, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 55%
0.00326
Низкий