← Back to CVEs
CVE-2019-3821
HIGH7.5
Description
A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/27/2019
Last Modified5/5/2025
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxceph:civetweb
Weaknesses (CWE)
CWE-772CWE-772
References
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821(secalert@redhat.com)
https://github.com/ceph/civetweb/pull/33(secalert@redhat.com)
https://usn.ubuntu.com/4035-1/(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/ceph/civetweb/pull/33(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4035-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.