First published: Mon Aug 06 2018(Updated: )
A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Gluster GlusterFS | >=3.12<3.12.14 | |
Gluster GlusterFS | >=4.1<4.1.8 | |
Redhat Virtualization Host | =4.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10929 is a vulnerability found in the glusterfs server that allows an authenticated attacker to create arbitrary files and execute arbitrary code.
The severity of CVE-2018-10929 is high with a CVSS score of 8.8.
The following software versions are affected: glusterfs 3.12.14, glusterfs 4.1.4, Debian Debian Linux 8.0, Debian Debian Linux 9.0, Redhat Enterprise Linux Server 6.0, Redhat Enterprise Linux Server 7.0, Redhat Virtualization Host 4.0, openSUSE Leap 15.1.
An attacker can exploit CVE-2018-10929 by sending a malicious RPC request using gfs2_create_req, allowing them to create arbitrary files and execute arbitrary code on glusterfs server nodes.
You can find more information about CVE-2018-10929 at the following references: [link1], [link2], [link3].