Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-14653

Опубликовано: 31 окт. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.

A buffer overflow on the heap was found in gf_getspec_req RPC request. A remote, authenticated attacker could use this flaw to cause denial of service and read arbitrary files on glusterfs server node.

Отчет

This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there. This flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6glusterfsNot affected
Red Hat Enterprise Linux 7glusterfsNot affected
Red Hat Enterprise Linux 8glusterfsNot affected
Native Client for RHEL 6 for Red Hat StorageglusterfsFixedRHSA-2018:343131.10.2018
Native Client for RHEL 7 for Red Hat StorageglusterfsFixedRHSA-2018:343231.10.2018
Red Hat Gluster Storage 3.4 for RHEL 6glusterfsFixedRHSA-2018:343131.10.2018
Red Hat Gluster Storage 3.4 for RHEL 6redhat-storage-serverFixedRHSA-2018:343131.10.2018
Red Hat Gluster Storage 3.4 for RHEL 7glusterfsFixedRHSA-2018:343231.10.2018
Red Hat Gluster Storage 3.4 for RHEL 7redhat-storage-serverFixedRHSA-2018:343231.10.2018
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7glusterfsFixedRHSA-2018:343231.10.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1633431glusterfs: Heap-based buffer overflow via "gf_getspec_req" RPC message

EPSS

Процентиль: 85%
0.02464
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.

CVSS3: 8.8
nvd
больше 7 лет назад

The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.

CVSS3: 8.8
debian
больше 7 лет назад

The Gluster file system through versions 4.1.4 and 3.12 is vulnerable ...

CVSS3: 8.8
github
больше 3 лет назад

The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.

EPSS

Процентиль: 85%
0.02464
Низкий

6.5 Medium

CVSS3