A flaw was found in Red Hat Ceph prior to 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated malicious user to launch a denial of service attack by sending null or specially crafted POST object requests.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat ceph |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server 7.0 |