4
CVSSv2

CVE-2020-15114

Published: 06/08/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 7.7 | Impact Score: 4 | Exploitability Score: 3.1
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

In etcd prior to 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat etcd

fedoraproject fedora 32

Vendor Advisories

Debian Bug report logs - #968740 CVE-2020-15106 CVE-2020-15112 CVE-2020-15113 CVE-2020-15114 CVE-2020-15115 Package: etcd; Maintainer for etcd is Debian Go Packaging Team <team+pkg-go@trackerdebianorg>; Source for etcd is src:etcd (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Thu, 20 ...
Several security issues were fixed in etcd ...