First published: Tue Oct 23 2018(Updated: )
Splunkd in Splunk Enterprise 6.2.x before 6.2.14 6.3.x before 6.3.11, and 6.4.x before 6.4.8; and Splunk Light before 6.5.0 allow remote attackers to cause a denial of service via a malformed HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk | <6.5.0 | |
Splunk | >=6.2.0<6.2.14 | |
Splunk | >=6.3.0<6.3.11 | |
Splunk | >=6.4.0<6.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7429 is classified as a denial of service vulnerability affecting multiple versions of Splunk.
To fix CVE-2018-7429, upgrade to Splunk Enterprise version 6.2.14 or later, 6.3.11 or later, 6.4.8 or later, or install Splunk Light version 6.5.0 or later.
CVE-2018-7429 is caused by Splunkd allowing remote attackers to send malformed HTTP requests which trigger a denial of service.
CVE-2018-7429 affects Splunk Enterprise versions 6.2.x prior to 6.2.14, 6.3.x prior to 6.3.11, 6.4.x prior to 6.4.8, and Splunk Light prior to 6.5.0.
Yes, CVE-2018-7429 can be exploited remotely by attackers to cause a denial of service.