Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-19337

Опубликовано: 19 дек. 2019
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.

A flaw was found in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.

Отчет

This flaw only affects Red Hat Ceph Storage 3, upstream versions of ceph are not affected. The ceph package distributed by Red Hat Enterprise Linux 7 and 8 are not affected by this issue, as it doesn't ship any server-side library. Red Hat OpenStack now consumes fixes directly from the base ceph channels . Therefore the ceph package provided by Red Hat OpenStack 13 has been marked as 'will not fix'.

Меры по смягчению последствий

  1. By default system will use /etc/init.d/ceph-radosgw, stop this service by ~]# /etc/init.d/ceph-radosgw stop
  2. Create systemd service, and change command line parameters according to the environment where Ceph radosgw is running. ~]# cat /usr/lib/systemd/system/ceph-rgw.service [Unit] Description=Ceph RGW daemon [Service] Type=forking ExecStart=/bin/radosgw -n client.rgw.$(HOSTNAME REDACTED) Restart=on-abnormal RestartSec=1s [Install] WantedBy=multi-user.target
  3. Run systemd service 'ceph-rgw.service' Caveat: It still takes +1-2 sec to get service back online. After applying above mentioned mitigation, the malicious IP can be blocked by a firewall rule if there are continuous attempts to launch remote denial of service. This mitigation is of limited use if the attack is launched from multiple IPs. It is recommended to limit the exposure of ceph RGW server to known clients.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2cephNot affected
Red Hat Ceph Storage 4cephNot affected
Red Hat Enterprise Linux 7ceph-commonNot affected
Red Hat Enterprise Linux 8cephNot affected
Red Hat OpenStack Platform 13 (Queens)cephWill not fix
Red Hat OpenStack Platform 15 (Stein)cephNot affected
Red Hat Ceph Storage 3.3cephFixedRHSA-2019:435319.12.2019
Red Hat Ceph Storage 3.3ceph-ansibleFixedRHSA-2019:435319.12.2019
Red Hat Ceph Storage 3.3cephmetricsFixedRHSA-2019:435319.12.2019
Red Hat Ceph Storage 3 for UbuntuFixedRHSA-2019:435719.12.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1781170ceph: denial of service in RGW daemon

EPSS

Процентиль: 67%
0.00552
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.

CVSS3: 6.5
nvd
около 6 лет назад

A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.

CVSS3: 6.5
debian
около 6 лет назад

A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph ...

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.

EPSS

Процентиль: 67%
0.00552
Низкий

6.5 Medium

CVSS3