First published: Tue Oct 01 2019(Updated: )
A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the service. This vulnerability could cause resource consumption and degradation of service in nbdkit, depending on the plugins configured on the server-side.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nbdkit | <1.12.7 | 1.12.7 |
redhat/nbdkit | <1.14.1 | 1.14.1 |
redhat/nbdkit | <1.15.1 | 1.15.1 |
Nbdkit Project Nbdkit | <1.12.7 | |
Nbdkit Project Nbdkit | >=1.14.0<1.14.1 | |
Nbdkit Project Nbdkit | >=1.15.0<1.15.1 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14850 is a denial of service vulnerability in nbdkit 1.12.7, 1.14.1, and 1.15.1.
CVE-2019-14850 allows an attacker to perform a large amount of work in initializing backend plugins by simply opening a connection to the nbdkit service.
The severity of CVE-2019-14850 is low with a CVSS score of 3.7.
The affected software versions are nbdkit 1.12.7, 1.14.1, and 1.15.1.
To fix CVE-2019-14850, update nbdkit to versions 1.12.8, 1.14.2, or 1.15.2.