CVE-2018-10907
Published: 4 September 2018
It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
From the Ubuntu Security Team
It was discovered that GlusterFS incorrectly handled mounting volumes. An attacker could possibly use this issue to cause a denial of service or run arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
glusterfs
Launchpad, Ubuntu, Debian |
bionic |
Released
(3.13.2-1ubuntu1+esm1)
Available with Ubuntu Pro |
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(4.1.4-1)
|
|
eoan |
Not vulnerable
(4.1.4-1)
|
|
focal |
Not vulnerable
(4.1.4-1)
|
|
groovy |
Not vulnerable
(4.1.4-1)
|
|
hirsute |
Not vulnerable
(4.1.4-1)
|
|
impish |
Not vulnerable
(4.1.4-1)
|
|
jammy |
Not vulnerable
(4.1.4-1)
|
|
kinetic |
Not vulnerable
(4.1.4-1)
|
|
lunar |
Not vulnerable
(4.1.4-1)
|
|
trusty |
Released
(3.4.2-1ubuntu1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Needs triage
|
|
xenial |
Released
(3.7.6-1ubuntu1+esm1)
Available with Ubuntu Pro |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1601642
- https://review.gluster.org/21070
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10907
- https://review.gluster.org/#/c/glusterfs/+/21070/
- https://ubuntu.com/security/notices/USN-4770-1
- https://www.cve.org/CVERecord?id=CVE-2018-10907
- NVD
- Launchpad
- Debian