First published: Tue Jul 31 2018(Updated: )
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ceph | <0.94.3.9-8 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-8626 is medium.
CVE-2016-8626 affects Red Hat Ceph versions before 0.94.9-8.
Yes, an authenticated attacker can launch a denial of service attack by sending null or specially crafted POST object requests.
Red Hat Enterprise Linux Desktop, Server, and Workstation versions 7.0 are affected by CVE-2016-8626.
Yes, you can find references for CVE-2016-8626 at the following links: [http://rhn.redhat.com/errata/RHSA-2016-2815.html](http://rhn.redhat.com/errata/RHSA-2016-2815.html), [http://rhn.redhat.com/errata/RHSA-2016-2816.html](http://rhn.redhat.com/errata/RHSA-2016-2816.html), [http://rhn.redhat.com/errata/RHSA-2016-2847.html](http://rhn.redhat.com/errata/RHSA-2016-2847.html).