Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8551

Опубликовано: 27 мар. 2020
Источник: debian
EPSS Низкий

Описание

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kubernetesfixed1.17.4-1package

Примечания

  • https://github.com/kubernetes/kubernetes/issues/89377

EPSS

Процентиль: 52%
0.00295
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

CVSS3: 4.3
redhat
около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

CVSS3: 4.3
nvd
около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

CVSS3: 4.3
github
больше 3 лет назад

Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes

EPSS

Процентиль: 52%
0.00295
Низкий