First published: Thu Sep 04 2014(Updated: )
IssueDescription: A denial of service flaw was found in the way the __socket_proto_state_machine() function of glusterfs processed certain fragment headers. A remote attacker could send a specially crafted fragment header that, when processed, would cause the glusterfs process to enter an infinite loop.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =13.1 | |
CentOS GlusterFS | =3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3619 is classified as a denial of service vulnerability.
To mitigate CVE-2014-3619, upgrade to a patched version of GlusterFS or openSUSE.
CVE-2014-3619 affects GlusterFS version 3.5 and openSUSE version 13.1.
Yes, CVE-2014-3619 can be exploited remotely by sending specially crafted fragment headers.
An attacker exploiting CVE-2014-3619 could cause the GlusterFS process to enter an infinite loop, leading to denial of service.