Vulnerability Name: | CVE-2014-6416 (CCN-95964) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2014-09-15 | ||||||||||||||||||||||||||||||||||||
Published: | 2014-09-15 | ||||||||||||||||||||||||||||||||||||
Updated: | 2023-01-17 | ||||||||||||||||||||||||||||||||||||
Summary: | Linux Kernel libceph is vulnerable to a buffer overflow, caused by improper bounds checking by the auth ticket size. By sending an overly large amount of tickets, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-6416 Source: cve@mitre.org Type: Exploit, Vendor Advisory cve@mitre.org Source: CCN Type: oss-security Mailing List, Mon, 15 Sep 2014 13:48:53 +0200 CVE Request: libceph auth token overflow Source: CCN Type: oss-security Mailing List, Mon, 15 Sep 2014 13:20:09 -0400 (EDT) Re: CVE Request: libceph auth token overflow / Linux kernel Source: cve@mitre.org Type: Broken Link cve@mitre.org Source: CCN Type: IBM Security Bulletin 1021943 PowerKVM Kernel Vulnerabilities - Multiple CVEs Source: cve@mitre.org Type: Exploit, Vendor Advisory cve@mitre.org Source: cve@mitre.org Type: Exploit, Mailing List cve@mitre.org Source: CCN Type: BID-69805 Linux Kernel 'ceph/auth_x.c' Buffer Overflow Vulnerability Source: cve@mitre.org Type: Third Party Advisory, VDB Entry cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Issue Tracking, Third Party Advisory cve@mitre.org Source: XF Type: UNKNOWN linux-kernel-cve20146416-bo(95964) Source: CCN Type: Linux Kernel GIT Repository libceph: do not hard code max auth ticket len Source: cve@mitre.org Type: Exploit, Third Party Advisory cve@mitre.org | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |