Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-01943

Опубликовано: 10 апр. 2023
Источник: fstec
CVSS3: 7.3
CVSS2: 7.5
EPSS Низкий

Описание

Уязвимость библиотек net/http и mime/multipart средства разработки GoLang, используемых в прикладном программном обеспечении ППО "Аврора Центр" связана с неконтролируемым потреблением ресурсов при определенных входных данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить атаку типа "отказ в обслуживании"

Вендор

Red Hat Inc.
Novell Inc.
Сообщество свободного программного обеспечения
ООО «Ред Софт»
The Go Project
ООО «Открытая мобильная платформа»

Наименование ПО

Red Hat Enterprise Linux
SUSE Linux Enterprise Server for SAP Applications
Debian GNU/Linux
openSUSE Tumbleweed
Red Hat Storage
OpenShift Container Platform
Red Hat Quay
SUSE CaaS Platform
Suse Linux Enterprise Server
SUSE Linux Enterprise High Performance Computing
РЕД ОС
OpenSUSE Leap
Ansible Automation Platform
Red Hat Openshift Data Foundation
SUSE Enterprise Storage
Red Hat Advanced Cluster Management for Kubernetes
Suse Linux Enterprise Desktop
Red Hat Migration Toolkit for Containers
Red Hat OpenStack Platform
SUSE Manager Retail Branch Server
SUSE Manager Proxy
SUSE Manager Server
SUSE Linux Enterprise Module for Development Tools
Node Maintenance Operator
Service Telemetry Framework
Application Interconnect
OpenShift Developer Tools and Services
SUSE Linux Enterprise Real Time
Red Hat Ceph Storage
Go
Аврора Центр
Red Hat OpenShift on AWS
Red Hat OpenShift Data Science (RHODS)
Openshift Service Mesh
OADP-1.1-RHEL-8
Node HealthCheck Operator
Network Observability Operator
Migration Toolkit for Applications
Migration Toolkit for Virtualization
Red Hat OpenShift Virtualization
OpenShift Serverless
SUSE Linux Enterprise Module for Containers

Версия ПО

8 (Red Hat Enterprise Linux)
15 SP1 (SUSE Linux Enterprise Server for SAP Applications)
10 (Debian GNU/Linux)
- (openSUSE Tumbleweed)
3 (Red Hat Storage)
4 (OpenShift Container Platform)
3 (Red Hat Quay)
4.0 (SUSE CaaS Platform)
15 SP1-LTSS (Suse Linux Enterprise Server)
15 SP1-LTSS (SUSE Linux Enterprise High Performance Computing)
11 (Debian GNU/Linux)
7.3 (РЕД ОС)
15.4 (OpenSUSE Leap)
15 SP3 (SUSE Linux Enterprise Server for SAP Applications)
2.0 (Ansible Automation Platform)
4 (Red Hat Openshift Data Foundation)
7 (SUSE Enterprise Storage)
15 SP2 (SUSE Linux Enterprise Server for SAP Applications)
15 SP2-LTSS (SUSE Linux Enterprise High Performance Computing)
2 (Red Hat Advanced Cluster Management for Kubernetes)
15 SP4 (Suse Linux Enterprise Server)
15 SP4 (Suse Linux Enterprise Desktop)
- (Red Hat Migration Toolkit for Containers)
15 SP4 (SUSE Linux Enterprise Server for SAP Applications)
9 (Red Hat Enterprise Linux)
15 SP2-LTSS (Suse Linux Enterprise Server)
16.2 (Red Hat OpenStack Platform)
4.3 (SUSE Manager Retail Branch Server)
4.3 (SUSE Manager Proxy)
4.3 (SUSE Manager Server)
15 SP4 (SUSE Linux Enterprise High Performance Computing)
7.1 (SUSE Enterprise Storage)
15 SP4 (SUSE Linux Enterprise Module for Development Tools)
- (Node Maintenance Operator)
1.4 for RHEL 8 (Service Telemetry Framework)
1.0 (Application Interconnect)
- (OpenShift Developer Tools and Services)
15 SP3-LTSS (Suse Linux Enterprise Server)
17.0 (Red Hat OpenStack Platform)
15 SP3-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP3-LTSS (SUSE Linux Enterprise High Performance Computing)
15 SP3 (SUSE Linux Enterprise Real Time)
5 (Red Hat Ceph Storage)
до 1.19.6 (Go)
1.20.0 (Go)
1.20.0 rc1 (Go)
1.20.0 rc2 (Go)
1.20.0 rc3 (Go)
до 3.2.0 включительно (Аврора Центр)
1.5 for RHEL 8 (Service Telemetry Framework)
- (Red Hat OpenShift on AWS)
- (Red Hat OpenShift Data Science (RHODS))
2.3.0 (Openshift Service Mesh)
- (OADP-1.1-RHEL-8)
- (Node HealthCheck Operator)
- (Network Observability Operator)
6 (Migration Toolkit for Applications)
- (Migration Toolkit for Virtualization)
4 (Red Hat OpenShift Virtualization)
- (OpenShift Serverless)
15 SP4 (SUSE Linux Enterprise Module for Containers)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое средство
ПО программно-аппаратного средства
ПО виртуализации/ПО виртуального программно-аппаратного средства

Операционные системы и аппаратные платформы

Red Hat Inc. Red Hat Enterprise Linux 8
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP1
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Novell Inc. openSUSE Tumbleweed -
Novell Inc. Suse Linux Enterprise Server 15 SP1-LTSS
Сообщество свободного программного обеспечения Debian GNU/Linux 11
ООО «Ред Софт» РЕД ОС 7.3
Novell Inc. OpenSUSE Leap 15.4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2
Novell Inc. Suse Linux Enterprise Server 15 SP4
Novell Inc. Suse Linux Enterprise Desktop 15 SP4
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4
Red Hat Inc. Red Hat Enterprise Linux 9
Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS
Novell Inc. Suse Linux Enterprise Server 15 SP3-LTSS
Novell Inc. SUSE Linux Enterprise Real Time 15 SP3

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,3)

Возможные меры по устранению уязвимости

Для GoLang:
https://go.dev/cl/468124
https://go.dev/issue/58006
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2022-41725
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2022-41725.html
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2022-41725
Для РедОС: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для программного обеспечения «Аврора Центр»:
Использование СЗИ нейтрализующих угрозы атак типа "отказ в обслуживании" (межсетевые экраны веб-приложений, системы обнаружения вторжений)

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 16%
0.00051
Низкий

7.3 High

CVSS3

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 9.8
redos
около 1 года назад

Множественные уязвимости buildah

CVSS3: 7.5
ubuntu
больше 2 лет назад

A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files...

CVSS3: 7.5
redhat
больше 2 лет назад

A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files...

CVSS3: 7.5
nvd
больше 2 лет назад

A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files cr

CVSS3: 7.5
debian
больше 2 лет назад

A denial of service is possible from excessive resource consumption in ...

EPSS

Процентиль: 16%
0.00051
Низкий

7.3 High

CVSS3

7.5 High

CVSS2