Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1128

Опубликовано: 10 июл. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.4
CVSS3: 7.5

Описание

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

12.2.7-0ubuntu0.18.04.1
cosmic

not-affected

13.2.4+dfsg1-0ubuntu0.18.10.1
devel

not-affected

13.2.4+dfsg1-0ubuntu1
disco

not-affected

13.2.4+dfsg1-0ubuntu1
eoan

not-affected

13.2.4+dfsg1-0ubuntu1
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

12.2.7-0ubuntu0.18.04.1
esm-infra/focal

not-affected

13.2.4+dfsg1-0ubuntu1
esm-infra/xenial

not-affected

10.2.11-0ubuntu0.16.04.1

Показывать по

Ссылки на источники

EPSS

Процентиль: 81%
0.01584
Низкий

5.4 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
nvd
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 7.5
debian
около 7 лет назад

It was found that cephx authentication protocol did not verify ceph cl ...

CVSS3: 7.5
github
больше 3 лет назад

It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

suse-cvrf
около 7 лет назад

Security update for ceph

EPSS

Процентиль: 81%
0.01584
Низкий

5.4 Medium

CVSS2

7.5 High

CVSS3