Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-1129

Опубликовано: 10 июл. 2018
Источник: nvd
CVSS3: 6.5
CVSS2: 3.3
EPSS Низкий

Описание

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Конфигурация 4
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

EPSS

Процентиль: 60%
0.00404
Низкий

6.5 Medium

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-284
CWE-287

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 7 лет назад

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 5.9
redhat
больше 7 лет назад

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 6.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
больше 7 лет назад

A flaw was found in the way signature calculation was handled by cephx ...

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

EPSS

Процентиль: 60%
0.00404
Низкий

6.5 Medium

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-284
CWE-287