Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-10222

Опубликовано: 08 нояб. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

РелизСтатусПримечание
bionic

released

12.2.12-0ubuntu0.18.04.2
devel

not-affected

14.2.2-0ubuntu2
disco

released

13.2.6-0ubuntu0.19.04.3
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

released

12.2.12-0ubuntu0.18.04.2
esm-infra/xenial

not-affected

code not present
precise/esm

not-affected

code not present
trusty

ignored

end of standard support
trusty/esm

not-affected

code not present
upstream

needs-triage

Показывать по

EPSS

Процентиль: 85%
0.02656
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 6 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

CVSS3: 7.5
nvd
около 6 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

CVSS3: 7.5
debian
около 6 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front ...

suse-cvrf
больше 6 лет назад

Security update for ceph

CVSS3: 7.5
github
больше 3 лет назад

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

EPSS

Процентиль: 85%
0.02656
Низкий

5 Medium

CVSS2

7.5 High

CVSS3