Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-1700

Опубликовано: 07 фев. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 6.5

Описание

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

РелизСтатусПримечание
bionic

released

12.2.12-0ubuntu0.18.04.5
devel

released

15.1.0-0ubuntu3
disco

ignored

end of life
eoan

released

14.2.4-0ubuntu0.19.10.2
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

released

12.2.12-0ubuntu0.18.04.5
esm-infra/xenial

not-affected

code not present
precise/esm

not-affected

code not present
trusty

ignored

end of standard support
trusty/esm

not-affected

code not present

Показывать по

EPSS

Процентиль: 55%
0.00326
Низкий

6.8 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
около 6 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.5
nvd
почти 6 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.5
debian
почти 6 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexp ...

CVSS3: 6.5
github
больше 3 лет назад

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

CVSS3: 6.3
fstec
около 6 лет назад

Уязвимость метода rgw::asio::ClientIO из rgw/rgw_asio_frontend.cc системы хранения данных Ceph, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 55%
0.00326
Низкий

6.8 Medium

CVSS2

6.5 Medium

CVSS3