First published: Tue Jul 17 2018(Updated: )
It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gluster GlusterFS | >=3.12.0<3.12.14 | |
Gluster GlusterFS | >=4.1.0<4.1.4 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10907 is a vulnerability found in the glusterfs server that allows an authenticated attacker to exploit stack-based buffer overflows.
An attacker can exploit CVE-2018-10907 by mounting a gluster volume and sending a string longer than the fixed buffer size.
The severity of CVE-2018-10907 is rated as high with a CVSS score of 8.8.
The versions affected by CVE-2018-10907 are 3.12.0 up to but excluding 3.12.14, and 4.1.0 up to but excluding 4.1.4.
To fix CVE-2018-10907, update glusterfs to version 3.12.14 or 4.1.4 depending on the affected version.