First published: Tue Oct 23 2018(Updated: )
Splunk Enterprise 6.2.x before 6.2.14, 6.3.x before 6.3.10, 6.4.x before 6.4.7, and 6.5.x before 6.5.3; and Splunk Light before 6.6.0 allow remote attackers to cause a denial of service via a crafted HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Splunk Splunk | <6.6.0 | |
Splunk Splunk | >=6.2.0<6.2.14 | |
Splunk Splunk | >=6.3.0<6.3.10 | |
Splunk Splunk | >=6.4.0<6.4.7 | |
Splunk Splunk | >=6.5.0<6.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7432 has a severity rating that allows for potential denial of service attacks.
To fix CVE-2018-7432, update Splunk Enterprise or Splunk Light to the latest versions as recommended in the advisory.
CVE-2018-7432 affects Splunk Enterprise versions 6.2.x through 6.5.x and Splunk Light before version 6.6.0.
Yes, CVE-2018-7432 can be exploited remotely by sending a crafted HTTP request.
The impact of CVE-2018-7432 is a denial of service, which can make the affected Splunk services unavailable.