Vulnerability Name: | CVE-2014-6418 (CCN-95966) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2014-09-15 | ||||||||||||||||||||||||||||||||||||
Published: | 2014-09-15 | ||||||||||||||||||||||||||||||||||||
Updated: | 2014-10-24 | ||||||||||||||||||||||||||||||||||||
Summary: | net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-6418 Source: CONFIRM Type: Exploit http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c27a3e4d667fdcad3db7b104f75659478e0c68d8 Source: CCN Type: oss-security Mailing List, Mon, 15 Sep 2014 13:48:53 +0200 CVE Request: libceph auth token overflow Source: CCN Type: oss-security Mailing List, Mon, 15 Sep 2014 13:20:09 -0400 (EDT) Re: CVE Request: libceph auth token overflow / Linux kernel Source: CONFIRM Type: Exploit http://tracker.ceph.com/issues/8979 Source: CONFIRM Type: UNKNOWN http://tracker.ceph.com/issues/9561 Source: CCN Type: IBM Security Bulletin 1021943 PowerKVM Kernel Vulnerabilities - Multiple CVEs Source: CONFIRM Type: Exploit, Vendor Advisory http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3 Source: MLIST Type: UNKNOWN [oss-security] 20140915 Re: CVE Request: libceph auth token overflow / Linux kernel Source: CCN Type: BID-70393 Linux Kernel CVE-2014-6418 Denial of Service Vulnerability Source: UBUNTU Type: UNKNOWN USN-2376-1 Source: UBUNTU Type: UNKNOWN USN-2377-1 Source: UBUNTU Type: UNKNOWN USN-2378-1 Source: UBUNTU Type: UNKNOWN USN-2379-1 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=1142073 Source: XF Type: UNKNOWN linux-kernel-cve20146418-dos(95966) Source: CCN Type: Linux Kernel GIT Repository libceph: do not hard code max auth ticket len Source: CONFIRM Type: Exploit https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |