First published: Thu Jun 30 2016(Updated: )
The handle_command function in mon/Monitor.cc in Ceph allows remote authenticated users to cause a denial of service (segmentation fault and ceph monitor crash) via an (1) empty or (2) crafted prefix.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ceph Storage Mon | =1.3 | |
Red Hat Ceph Storage OSD | =1.3 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux for Scientific Computing | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Ceph | <=0.94.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5009 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2016-5009, upgrade to the latest version of Ceph that addresses this vulnerability.
CVE-2016-5009 enables a denial of service attack through segmentation faults that crash Ceph monitors.
CVE-2016-5009 specifically affects Ceph versions up to 1.3.
Remote authenticated users can exploit CVE-2016-5009 by sending an empty or crafted prefix to the ceph monitor.