CVE-2016-5009

Related Vulnerabilities: CVE-2016-5009  

A flaw was found in the way handle_command() function would validate prefix value from user. An authenticated attacker could send a specially crafted prefix value resulting in ceph monitor crash.

A flaw was found in the way handle_command() function would validate prefix value from user. An authenticated attacker could send a specially crafted prefix value resulting in ceph monitor crash.

Find out more about CVE-2016-5009 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.9
Base Metrics AV:A/AC:M/Au:S/C:P/I:P/A:P
Access Vector Adjacent Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

CVSS v3 metrics

CVSS3 Base Score 4.9
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required Low
User Interaction Required
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Ceph Storage Tools 1.3 (ceph) RHSA-2016:1384 2016-07-05
Red Hat Ceph Storage 1.3 for Ubuntu RHSA-2016:1385 2016-07-05

Affected Packages State

Platform Package State
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 ceph Not affected
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 ceph Not affected
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) ceph Not affected
Red Hat Enterprise Linux 7 ceph Not affected
Red Hat Enterprise Linux 6 ceph Not affected

Acknowledgements

Red Hat would like to thank the Ceph project for reporting this issue. Upstream acknowledges Xiaoxi Chen as the original reporter.