Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8551

Опубликовано: 23 мар. 2020
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

A denial of service flaw was found in Kubernetes' Kubelet API. A remote attacker can exploit this flaw by sending repeated, crafted HTTP requests to exhaust available memory and cause a crash.

Отчет

By default, OpenShift Container Platform does not allow unauthenticated access to the Kubelet API. OpenShift Container Platform versions before 4.2 are not affected by this vulnerability as they are based on earlier versions of Kubernetes which do not include metrics for the Kubelet HTTP server.

Меры по смягчению последствий

Prevent unauthenticated or unauthorized access to the Kubelet API

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11atomic-openshiftNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-hypershiftNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-openshift-apiserver-rhel9Not affected
Red Hat Storage 3heketiNot affected
Red Hat OpenShift Container Platform 4.3openshiftFixedRHSA-2020:127607.04.2020
Red Hat OpenShift Container Platform 4.3openshift4/ose-hyperkubeFixedRHSA-2020:127708.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1816403kubernetes: crafted requests to kubelet API allow for memory exhaustion

EPSS

Процентиль: 53%
0.00295
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

CVSS3: 4.3
nvd
около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

CVSS3: 4.3
debian
около 5 лет назад

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1. ...

CVSS3: 4.3
github
больше 3 лет назад

Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes

EPSS

Процентиль: 53%
0.00295
Низкий

4.3 Medium

CVSS3

Уязвимость CVE-2020-8551