7.5
CWE
20 776 400
Advisory Published
Advisory Published
Updated

CVE-2019-11253: Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack

First published: Fri Sep 27 2019(Updated: )

A flaw was found kubernetes. The parsing of YAML manifests by the Kubernetes API server could lead to a denial-of-service attack leaving it vulnerable to an instance of a "billion laughs" attack. The highest threat from this vulnerability is to system availability.

Credit: jordan@liggitt.net jordan@liggitt.net

Affected SoftwareAffected VersionHow to fix
redhat/jaeger<0:v1.13.1.redhat5-1.el7
0:v1.13.1.redhat5-1.el7
redhat/jaeger-operator<0:v1.13.1.redhat8-1.el7
0:v1.13.1.redhat8-1.el7
redhat/kiali<0:v1.0.7.redhat1-1.el7
0:v1.0.7.redhat1-1.el7
redhat/servicemesh<0:1.0.2-3.el8
0:1.0.2-3.el8
redhat/servicemesh-cni<0:1.0.2-3.el8
0:1.0.2-3.el8
redhat/servicemesh-grafana<0:6.2.2-24.el8
0:6.2.2-24.el8
redhat/servicemesh-operator<0:1.0.2-7.el8
0:1.0.2-7.el8
redhat/servicemesh-prometheus<0:2.7.2-25.el8
0:2.7.2-25.el8
redhat/servicemesh-proxy<0:1.0.2-3.el8
0:1.0.2-3.el8
redhat/servicemesh-grafana<0:6.2.2-38.el8
0:6.2.2-38.el8
redhat/servicemesh-prometheus<0:2.7.2-36.el8
0:2.7.2-36.el8
redhat/servicemesh-cni<0:1.0.11-1.el8
0:1.0.11-1.el8
redhat/servicemesh-operator<0:1.1.4-3.el8
0:1.1.4-3.el8
redhat/servicemesh-grafana<0:6.4.3-11.el8
0:6.4.3-11.el8
redhat/servicemesh-cni<0:1.1.4-2.el8
0:1.1.4-2.el8
redhat/atomic-openshift<0:3.10.181-1.git.0.3ab4b3d.el7
0:3.10.181-1.git.0.3ab4b3d.el7
redhat/atomic-openshift<0:3.11.154-1.git.0.7a097ad.el7
0:3.11.154-1.git.0.7a097ad.el7
redhat/atomic-openshift<0:3.9.102-1.git.0.6411f52.el7
0:3.9.102-1.git.0.6411f52.el7
redhat/openshift<0:4.1.20-201910101746.git.0.a80aad5.el8
0:4.1.20-201910101746.git.0.a80aad5.el8
Kubernetes Kubernetes>=1.1.0<=1.12.10
Kubernetes Kubernetes>=1.13.0<1.13.2
Kubernetes Kubernetes>=1.14.0<1.14.8
Kubernetes Kubernetes>=1.15.0<1.15.5
Kubernetes Kubernetes>=1.16.0<1.16.2
Redhat Openshift Container Platform=3.9
Redhat Openshift Container Platform=3.10
Redhat Openshift Container Platform=3.11
go/k8s.io/kubernetes>=1.16.0<1.16.2
1.16.2
go/k8s.io/kubernetes>=1.15.0<1.15.5
1.15.5
go/k8s.io/kubernetes>=1.14.0<1.14.8
1.14.8
go/k8s.io/kubernetes>=1.0.0<1.13.12
1.13.12

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is CVE-2019-11253?

    CVE-2019-11253 is a vulnerability in Kubernetes that allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unresponsive.

  • How does CVE-2019-11253 impact Kubernetes API server?

    CVE-2019-11253 can result in the Kubernetes API server consuming excessive CPU or memory, potentially leading to crash and unresponsiveness.

  • What is the severity level of CVE-2019-11253?

    CVE-2019-11253 has a severity level of 7.5 (high).

  • Which versions of Kubernetes are affected by CVE-2019-11253?

    Versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 are affected by CVE-2019-11253.

  • How can I fix CVE-2019-11253?

    To fix CVE-2019-11253, ensure that you update your Kubernetes version to at least v1.13.12, v1.14.8, v1.15.5, or v1.16.2.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203