A flaw was found in the way handle_command() function would validate prefix value from user. An authenticated attacker could send a specially crafted prefix value resulting in ceph monitor crash.
Find out more about CVE-2016-5009 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 4.9 |
---|---|
Base Metrics | AV:A/AC:M/Au:S/C:P/I:P/A:P |
Access Vector | Adjacent Network |
Access Complexity | Medium |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
CVSS3 Base Score | 4.9 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
Attack Vector | Adjacent Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | Low |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Ceph Storage Tools 1.3 (ceph) | RHSA-2016:1384 | 2016-07-05 |
Red Hat Ceph Storage 1.3 for Ubuntu | RHSA-2016:1385 | 2016-07-05 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | ceph | Not affected |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | ceph | Not affected |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) | ceph | Not affected |
Red Hat Enterprise Linux 7 | ceph | Not affected |
Red Hat Enterprise Linux 6 | ceph | Not affected |