Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1002100

Опубликовано: 28 фев. 2019
Источник: redhat
CVSS3: 6.5
EPSS Средний

Описание

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. kubectl patch --type json or "Content-Type: application/json-patch+json") that consumes excessive resources while processing, causing a Denial of Service on the API Server.

A denial of service vulnerability was found in the Kubernetes API server. A remote user, with authorization to apply patches, could exploit this via crafted JSON input, causing excessive consumption of resources and subsequent denial of service.

Отчет

This issue affects the Kubernetes API Server, shipped in OpenShift Container Platform versions 3.4 through 3.11 as part of the atomic-openshift package. Red Hat Product Security has rated this issue as having a security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Меры по смягчению последствий

Remove ‘patch’ permissions from untrusted users.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.4atomic-openshiftWill not fix
Red Hat OpenShift Container Platform 3.5atomic-openshiftWill not fix
Red Hat OpenShift Container Platform 3.6atomic-openshiftOut of support scope
Red Hat OpenShift Container Platform 3.7atomic-openshiftOut of support scope
Red Hat OpenShift Container Platform 3.9atomic-openshiftFix deferred
Red Hat OpenShift Container Platform 4openshiftNot affected
Red Hat Storage 3heketiAffected
Red Hat OpenShift Container Platform 3.10atomic-openshiftFixedRHSA-2019:323929.10.2019
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHSA-2019:185124.07.2019
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsFixedRHSA-2019:185124.07.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1683190kube-apiserver: DoS with crafted patch of type json-patch

EPSS

Процентиль: 93%
0.10705
Средний

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
nvd
около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CVSS3: 6.5
debian
около 6 лет назад

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, use ...

CVSS3: 6.5
github
около 3 лет назад

Kubernetes DoS Vulnerability

CVSS3: 6.5
fstec
больше 6 лет назад

Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 93%
0.10705
Средний

6.5 Medium

CVSS3

Уязвимость CVE-2019-1002100