First published: Fri Dec 08 2017(Updated: )
Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cogent Datahub | =0.12.29 | |
Cogent Datahub | =0.12.30 | |
Cogent Datahub | =0.12.31 | |
Cogent Datahub | =0.12.32 | |
Cogent Datahub | =0.12.33 | |
Cogent Datahub | =0.12.34 | |
Cogent Datahub | =0.12.35 | |
Cogent Datahub | =0.12.36 | |
Cogent Datahub | =0.12.37 | |
Cogent Datahub | =0.12.38 | |
Cogent Datahub | =0.12.39 | |
Cogent Datahub | =0.12.40 | |
Red Hat OpenStack for IBM Power | =13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10906 has a medium severity level as it allows for potential execution of arbitrary commands.
To remediate CVE-2017-10906, upgrade Fluentd to versions 0.12.41 or later.
Fluentd versions 0.12.29 through 0.12.40 are affected by CVE-2017-10906.
While CVE-2017-10906 primarily impacts the terminal UI, it may lead to unauthorized command execution, posing risks to sensitive data.
CVE-2017-10906 affects the filter_parser.rb in the filter_stream function within Fluentd.