6.8
CVSSv2

CVE-2020-1700

Published: 07/02/2020 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ceph ceph -

redhat openshift container storage 4.2

opensuse leap 15.1

canonical ubuntu linux 18.04

canonical ubuntu linux 19.10

Vendor Advisories

Ceph could be made to stop responding if it received specially crafted network traffic ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-1700 ceph: connection leak in the RGW Beast front-end permits a DoS against the RGW server <!--X-Subject-Header-End-- ...