Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-4186

Опубликовано: 09 фев. 2015
Источник: nvd

Описание

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Связанные уязвимости

redhat
почти 11 лет назад

[REJECTED CVE] Any host, whether a peer member or not, can use the remote-host command to gain access to the trusted peer group. The remote host can peer probe itself, modify the volume, set up geo-rep to a 3rd party, etc. Network security is not enough. Take, for instance, a storage-as-a-service model where you allow untrusted users to mount volumes. Since they need access to 24007 to retrieve their volume configuration, they can also issue remote-host commands.