Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1129

Опубликовано: 10 июл. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 3.3
CVSS3: 6.5

Описание

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

12.2.7-0ubuntu0.18.04.1
cosmic

not-affected

13.2.4+dfsg1-0ubuntu0.18.10.1
devel

not-affected

13.2.4+dfsg1-0ubuntu1
disco

not-affected

13.2.4+dfsg1-0ubuntu1
eoan

not-affected

13.2.4+dfsg1-0ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

12.2.7-0ubuntu0.18.04.1
esm-infra/focal

not-affected

13.2.4+dfsg1-0ubuntu1
esm-infra/xenial

not-affected

10.2.11-0ubuntu0.16.04.1

Показывать по

Ссылки на источники

3.3 Low

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 7 лет назад

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 6.5
nvd
больше 7 лет назад

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

CVSS3: 6.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
больше 7 лет назад

A flaw was found in the way signature calculation was handled by cephx ...

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.

3.3 Low

CVSS2

6.5 Medium

CVSS3