ID CVE-2014-3619
Summary The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.
References
Vulnerable Configurations
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gluster:glusterfs:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:gluster:glusterfs:3.5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 13-02-2023 - 00:41)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
rpms
  • gluster-nagios-addons-0:0.1.14-1.el6rhs
  • gluster-nagios-addons-debuginfo-0:0.1.14-1.el6rhs
  • gluster-nagios-common-0:0.1.4-1.el6rhs
  • glusterfs-0:3.6.0.42-1.el5
  • glusterfs-0:3.6.0.42-1.el6
  • glusterfs-0:3.6.0.42-1.el6rhs
  • glusterfs-api-0:3.6.0.42-1.el5
  • glusterfs-api-0:3.6.0.42-1.el6
  • glusterfs-api-0:3.6.0.42-1.el6rhs
  • glusterfs-api-devel-0:3.6.0.42-1.el5
  • glusterfs-api-devel-0:3.6.0.42-1.el6
  • glusterfs-api-devel-0:3.6.0.42-1.el6rhs
  • glusterfs-cli-0:3.6.0.42-1.el6rhs
  • glusterfs-debuginfo-0:3.6.0.42-1.el5
  • glusterfs-debuginfo-0:3.6.0.42-1.el6
  • glusterfs-debuginfo-0:3.6.0.42-1.el6rhs
  • glusterfs-devel-0:3.6.0.42-1.el5
  • glusterfs-devel-0:3.6.0.42-1.el6
  • glusterfs-devel-0:3.6.0.42-1.el6rhs
  • glusterfs-fuse-0:3.6.0.42-1.el5
  • glusterfs-fuse-0:3.6.0.42-1.el6
  • glusterfs-fuse-0:3.6.0.42-1.el6rhs
  • glusterfs-geo-replication-0:3.6.0.42-1.el6rhs
  • glusterfs-libs-0:3.6.0.42-1.el5
  • glusterfs-libs-0:3.6.0.42-1.el6
  • glusterfs-libs-0:3.6.0.42-1.el6rhs
  • glusterfs-rdma-0:3.6.0.42-1.el5
  • glusterfs-rdma-0:3.6.0.42-1.el6
  • glusterfs-rdma-0:3.6.0.42-1.el6rhs
  • glusterfs-server-0:3.6.0.42-1.el6rhs
  • gstatus-0:0.62-1.el6rhs
  • gstatus-debuginfo-0:0.62-1.el6rhs
  • libsmbclient-0:3.6.509-169.4.el6rhs
  • libsmbclient-devel-0:3.6.509-169.4.el6rhs
  • openstack-swift-0:1.13.1-2.el6ost
  • openstack-swift-account-0:1.13.1-2.el6ost
  • openstack-swift-container-0:1.13.1-2.el6ost
  • openstack-swift-doc-0:1.13.1-2.el6ost
  • openstack-swift-object-0:1.13.1-2.el6ost
  • openstack-swift-plugin-swift3-0:1.7-3.el6ost
  • openstack-swift-proxy-0:1.13.1-2.el6ost
  • python-paste-deploy-0:1.5.0-10.el6ost
  • python-swiftclient-0:2.1.0-2.el6ost
  • python-swiftclient-doc-0:2.1.0-2.el6ost
  • redhat-storage-server-0:3.0.3.4-1.el6rhs
  • samba-0:3.6.509-169.4.el6rhs
  • samba-client-0:3.6.509-169.4.el6rhs
  • samba-common-0:3.6.509-169.4.el6rhs
  • samba-debuginfo-0:3.6.509-169.4.el6rhs
  • samba-doc-0:3.6.509-169.4.el6rhs
  • samba-domainjoin-gui-0:3.6.509-169.4.el6rhs
  • samba-glusterfs-0:3.6.509-169.4.el6rhs
  • samba-swat-0:3.6.509-169.4.el6rhs
  • samba-winbind-0:3.6.509-169.4.el6rhs
  • samba-winbind-clients-0:3.6.509-169.4.el6rhs
  • samba-winbind-devel-0:3.6.509-169.4.el6rhs
  • samba-winbind-krb5-locator-0:3.6.509-169.4.el6rhs
  • swiftonfile-0:1.13.1-2.el6rhs
  • vdsm-0:4.14.7.3-1.el6rhs
  • vdsm-api-0:4.14.7.3-1.el6rhs
  • vdsm-cli-0:4.14.7.3-1.el6rhs
  • vdsm-debug-plugin-0:4.14.7.3-1.el6rhs
  • vdsm-debuginfo-0:4.14.7.3-1.el6rhs
  • vdsm-gluster-0:4.14.7.3-1.el6rhs
  • vdsm-hook-faqemu-0:4.14.7.3-1.el6rhs
  • vdsm-hook-openstacknet-0:4.14.7.3-1.el6rhs
  • vdsm-hook-qemucmdline-0:4.14.7.3-1.el6rhs
  • vdsm-jsonrpc-0:4.14.7.3-1.el6rhs
  • vdsm-python-0:4.14.7.3-1.el6rhs
  • vdsm-python-zombiereaper-0:4.14.7.3-1.el6rhs
  • vdsm-reg-0:4.14.7.3-1.el6rhs
  • vdsm-tests-0:4.14.7.3-1.el6rhs
  • vdsm-xmlrpc-0:4.14.7.3-1.el6rhs
  • vdsm-yajsonrpc-0:4.14.7.3-1.el6rhs
  • glusterfs-0:3.6.0.42-1.el7
  • glusterfs-api-0:3.6.0.42-1.el7
  • glusterfs-api-devel-0:3.6.0.42-1.el7
  • glusterfs-debuginfo-0:3.6.0.42-1.el7
  • glusterfs-devel-0:3.6.0.42-1.el7
  • glusterfs-fuse-0:3.6.0.42-1.el7
  • glusterfs-libs-0:3.6.0.42-1.el7
  • glusterfs-rdma-0:3.6.0.42-1.el7
refmap via4
confirm
mandriva MDVSA-2015:211
misc https://bugzilla.redhat.com/show_bug.cgi?id=1138145
suse
  • openSUSE-SU-2015:0473
  • openSUSE-SU-2015:0528
Last major update 13-02-2023 - 00:41
Published 27-03-2015 - 14:59
Last modified 13-02-2023 - 00:41
Back to Top