Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1128

Опубликовано: 09 июл. 2018
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to the ceph cluster network who is also able to sniff packets on the network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service.

Отчет

Red Hat OpenStack Platform ships the flawed package, however RHOSP deployments use the ceph package directly from the Ceph channel. A RHOSP ceph update will therefore not be provided at this time, but please ensure that the underlying Red Hat Ceph Storage is updated.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.3cephWill not fix
Red Hat Enterprise Linux 7ceph-commonWill not fix
Red Hat Enterprise Linux 8cephNot affected
Red Hat OpenStack Platform 13 (Queens)cephWill not fix
Red Hat Ceph Storage 2.5cephFixedRHSA-2018:226126.07.2018
Red Hat Ceph Storage 2.5ceph-ansibleFixedRHSA-2018:226126.07.2018
Red Hat Ceph Storage 2 for UbuntuFixedRHSA-2018:227426.07.2018
Red Hat Ceph Storage 3.0cephFixedRHSA-2018:217711.07.2018
Red Hat Ceph Storage 3.0ceph-ansibleFixedRHSA-2018:217711.07.2018
Red Hat Ceph Storage 3.0cephmetricsFixedRHSA-2018:217711.07.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-294
https://bugzilla.redhat.com/show_bug.cgi?id=1575866ceph: cephx protocol is vulnerable to replay attack

EPSS

Процентиль: 81%
0.01584
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
nvd
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
debian
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph cl ...

CVSS3: 7.5
github
больше 3 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

suse-cvrf
около 7 лет назад

Security update for ceph

EPSS

Процентиль: 81%
0.01584
Низкий

5.9 Medium

CVSS3