Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-16818

Опубликовано: 10 окт. 2017
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.3cephNot affected
Red Hat Ceph Storage 2cephNot affected
Red Hat Enterprise Linux 7ceph-commonNot affected
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)cephNot affected
Red Hat Enterprise Linux OpenStack Platform 6 (Juno) InstallercephNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1515872ceph: Failed assertion through user input in ceph_assert() function in rgw_iam_policy.cc

EPSS

Процентиль: 69%
0.00587
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 8 лет назад

RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.

CVSS3: 6.5
nvd
около 8 лет назад

RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.

CVSS3: 6.5
debian
около 8 лет назад

RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticate ...

CVSS3: 6.5
github
больше 3 лет назад

RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.

suse-cvrf
больше 7 лет назад

Security update for ceph

EPSS

Процентиль: 69%
0.00587
Низкий

5.3 Medium

CVSS3