First published: Wed Jun 06 2018(Updated: )
Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not handle errors thrown while constructing certain http requests. A remote authenticated user may construct malicious requests to cause the traffic controller to leave dangling TCP connections, which could cause denial of service.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry Loggregator | >=89<89.5 | |
Cloudfoundry Loggregator | >=96<96.1 | |
Cloudfoundry Loggregator | >=99<99.1 | |
Cloudfoundry Loggregator | >=101<101.9 | |
Cloudfoundry Loggregator | >=102<102.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1269 is a vulnerability in Cloud Foundry Loggregator versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2.
CVE-2018-1269 allows a remote authenticated user to construct malicious requests that can cause traffic analysis and a denial of service (DoS).
The severity of CVE-2018-1269 is medium, with a CVSS severity score of 6.5.
To fix CVE-2018-1269, upgrade Cloud Foundry Loggregator to version 89.5, 96.1, 99.1, 101.9, or 102.2 or later.
More information about CVE-2018-1269 can be found at the following link: [https://www.cloudfoundry.org/blog/cve-2018-1269](https://www.cloudfoundry.org/blog/cve-2018-1269)