← Back to CVEs
CVE-2018-14652
MEDIUM6.5
Description
The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service.
CVE Details
CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published10/31/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
debian:debian_linuxredhat:enterprise_linux_serverredhat:enterprise_linux_virtualizationredhat:enterprise_virtualization_hostredhat:gluster_storage
Weaknesses (CWE)
CWE-120CWE-119
References
https://access.redhat.com/errata/RHSA-2018:3431(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3432(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3470(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html(secalert@redhat.com)
https://security.gentoo.org/glsa/201904-06(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2018:3431(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3432(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3470(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201904-06(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.