English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 150599 CVE descriptions
and 73533 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891565
Category:Debian Local Security Checks
Title:Debian LTS Advisory ([SECURITY] [DLA 1565-1] glusterfs security update)
Summary:Multiple security vulnerabilities were discovered in GlusterFS, a;clustered file system. Buffer overflows and path traversal issues may;lead to information disclosure, denial-of-service or the execution of;arbitrary code.;;CVE-2018-14651;;It was found that the fix for CVE-2018-10927, CVE-2018-10928,;CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete.;A remote, authenticated attacker could use one of these flaws to;execute arbitrary code, create arbitrary files, or cause denial of;service on glusterfs server nodes via symlinks to relative paths.;;CVE-2018-14652;;The Gluster file system is vulnerable to a buffer overflow in the;'features/index' translator via the code handling the;'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote;authenticated attacker could exploit this on a mounted volume to;cause a denial of service.;;CVE-2018-14653;;The Gluster file system is vulnerable to a heap-based buffer;overflow in the '__server_getspec' function via the 'gf_getspec_req';RPC message. A remote authenticated attacker could exploit this to;cause a denial of service or other potential unspecified impact.;;CVE-2018-14659;;The Gluster file system is vulnerable to a denial of service attack;via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote,;authenticated attacker could exploit this by mounting a Gluster;volume and repeatedly calling 'setxattr(2)' to trigger a state dump;and create an arbitrary number of files in the server's runtime;directory.;;CVE-2018-14661;;It was found that usage of snprintf function in feature/locks;translator of glusterfs server was vulnerable to a format string;attack. A remote, authenticated attacker could use this flaw to;cause remote denial of service.
Description:Summary:
Multiple security vulnerabilities were discovered in GlusterFS, a
clustered file system. Buffer overflows and path traversal issues may
lead to information disclosure, denial-of-service or the execution of
arbitrary code.

CVE-2018-14651

It was found that the fix for CVE-2018-10927, CVE-2018-10928,
CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete.
A remote, authenticated attacker could use one of these flaws to
execute arbitrary code, create arbitrary files, or cause denial of
service on glusterfs server nodes via symlinks to relative paths.

CVE-2018-14652

The Gluster file system is vulnerable to a buffer overflow in the
'features/index' translator via the code handling the
'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote
authenticated attacker could exploit this on a mounted volume to
cause a denial of service.

CVE-2018-14653

The Gluster file system is vulnerable to a heap-based buffer
overflow in the '__server_getspec' function via the 'gf_getspec_req'
RPC message. A remote authenticated attacker could exploit this to
cause a denial of service or other potential unspecified impact.

CVE-2018-14659

The Gluster file system is vulnerable to a denial of service attack
via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote,
authenticated attacker could exploit this by mounting a Gluster
volume and repeatedly calling 'setxattr(2)' to trigger a state dump
and create an arbitrary number of files in the server's runtime
directory.

CVE-2018-14661

It was found that usage of snprintf function in feature/locks
translator of glusterfs server was vulnerable to a format string
attack. A remote, authenticated attacker could use this flaw to
cause remote denial of service.

Affected Software/OS:
glusterfs on Debian Linux

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
3.5.2-2+deb8u5.

We recommend that you upgrade your glusterfs packages.

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-10926
Common Vulnerability Exposure (CVE) ID: CVE-2018-10927
Common Vulnerability Exposure (CVE) ID: CVE-2018-10928
Common Vulnerability Exposure (CVE) ID: CVE-2018-10929
Common Vulnerability Exposure (CVE) ID: CVE-2018-10930
Common Vulnerability Exposure (CVE) ID: CVE-2018-14651
Common Vulnerability Exposure (CVE) ID: CVE-2018-14652
Common Vulnerability Exposure (CVE) ID: CVE-2018-14653
Common Vulnerability Exposure (CVE) ID: CVE-2018-14659
Common Vulnerability Exposure (CVE) ID: CVE-2018-14661
CopyrightCopyright (c) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.