Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-14659

Опубликовано: 31 окт. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 4
CVSS3: 6.5

Описание

The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

4.1.4-1
disco

not-affected

4.1.4-1
eoan

not-affected

4.1.4-1
esm-apps/bionic

released

3.13.2-1ubuntu1+esm1
esm-apps/focal

not-affected

4.1.4-1
esm-apps/xenial

released

3.7.6-1ubuntu1+esm1
esm-infra-legacy/trusty

released

3.4.2-1ubuntu1+esm1
focal

not-affected

4.1.4-1

Показывать по

4 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
больше 7 лет назад

The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.

CVSS3: 6.5
nvd
больше 7 лет назад

The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.

CVSS3: 6.5
debian
больше 7 лет назад

The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable ...

CVSS3: 6.5
github
больше 3 лет назад

The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.

4 Medium

CVSS2

6.5 Medium

CVSS3