ID |
CVE-2014-3619
|
Summary |
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.0 (as of 13-02-2023 - 00:41) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
redhat
via4
|
rpms | - gluster-nagios-addons-0:0.1.14-1.el6rhs
- gluster-nagios-addons-debuginfo-0:0.1.14-1.el6rhs
- gluster-nagios-common-0:0.1.4-1.el6rhs
- glusterfs-0:3.6.0.42-1.el5
- glusterfs-0:3.6.0.42-1.el6
- glusterfs-0:3.6.0.42-1.el6rhs
- glusterfs-api-0:3.6.0.42-1.el5
- glusterfs-api-0:3.6.0.42-1.el6
- glusterfs-api-0:3.6.0.42-1.el6rhs
- glusterfs-api-devel-0:3.6.0.42-1.el5
- glusterfs-api-devel-0:3.6.0.42-1.el6
- glusterfs-api-devel-0:3.6.0.42-1.el6rhs
- glusterfs-cli-0:3.6.0.42-1.el6rhs
- glusterfs-debuginfo-0:3.6.0.42-1.el5
- glusterfs-debuginfo-0:3.6.0.42-1.el6
- glusterfs-debuginfo-0:3.6.0.42-1.el6rhs
- glusterfs-devel-0:3.6.0.42-1.el5
- glusterfs-devel-0:3.6.0.42-1.el6
- glusterfs-devel-0:3.6.0.42-1.el6rhs
- glusterfs-fuse-0:3.6.0.42-1.el5
- glusterfs-fuse-0:3.6.0.42-1.el6
- glusterfs-fuse-0:3.6.0.42-1.el6rhs
- glusterfs-geo-replication-0:3.6.0.42-1.el6rhs
- glusterfs-libs-0:3.6.0.42-1.el5
- glusterfs-libs-0:3.6.0.42-1.el6
- glusterfs-libs-0:3.6.0.42-1.el6rhs
- glusterfs-rdma-0:3.6.0.42-1.el5
- glusterfs-rdma-0:3.6.0.42-1.el6
- glusterfs-rdma-0:3.6.0.42-1.el6rhs
- glusterfs-server-0:3.6.0.42-1.el6rhs
- gstatus-0:0.62-1.el6rhs
- gstatus-debuginfo-0:0.62-1.el6rhs
- libsmbclient-0:3.6.509-169.4.el6rhs
- libsmbclient-devel-0:3.6.509-169.4.el6rhs
- openstack-swift-0:1.13.1-2.el6ost
- openstack-swift-account-0:1.13.1-2.el6ost
- openstack-swift-container-0:1.13.1-2.el6ost
- openstack-swift-doc-0:1.13.1-2.el6ost
- openstack-swift-object-0:1.13.1-2.el6ost
- openstack-swift-plugin-swift3-0:1.7-3.el6ost
- openstack-swift-proxy-0:1.13.1-2.el6ost
- python-paste-deploy-0:1.5.0-10.el6ost
- python-swiftclient-0:2.1.0-2.el6ost
- python-swiftclient-doc-0:2.1.0-2.el6ost
- redhat-storage-server-0:3.0.3.4-1.el6rhs
- samba-0:3.6.509-169.4.el6rhs
- samba-client-0:3.6.509-169.4.el6rhs
- samba-common-0:3.6.509-169.4.el6rhs
- samba-debuginfo-0:3.6.509-169.4.el6rhs
- samba-doc-0:3.6.509-169.4.el6rhs
- samba-domainjoin-gui-0:3.6.509-169.4.el6rhs
- samba-glusterfs-0:3.6.509-169.4.el6rhs
- samba-swat-0:3.6.509-169.4.el6rhs
- samba-winbind-0:3.6.509-169.4.el6rhs
- samba-winbind-clients-0:3.6.509-169.4.el6rhs
- samba-winbind-devel-0:3.6.509-169.4.el6rhs
- samba-winbind-krb5-locator-0:3.6.509-169.4.el6rhs
- swiftonfile-0:1.13.1-2.el6rhs
- vdsm-0:4.14.7.3-1.el6rhs
- vdsm-api-0:4.14.7.3-1.el6rhs
- vdsm-cli-0:4.14.7.3-1.el6rhs
- vdsm-debug-plugin-0:4.14.7.3-1.el6rhs
- vdsm-debuginfo-0:4.14.7.3-1.el6rhs
- vdsm-gluster-0:4.14.7.3-1.el6rhs
- vdsm-hook-faqemu-0:4.14.7.3-1.el6rhs
- vdsm-hook-openstacknet-0:4.14.7.3-1.el6rhs
- vdsm-hook-qemucmdline-0:4.14.7.3-1.el6rhs
- vdsm-jsonrpc-0:4.14.7.3-1.el6rhs
- vdsm-python-0:4.14.7.3-1.el6rhs
- vdsm-python-zombiereaper-0:4.14.7.3-1.el6rhs
- vdsm-reg-0:4.14.7.3-1.el6rhs
- vdsm-tests-0:4.14.7.3-1.el6rhs
- vdsm-xmlrpc-0:4.14.7.3-1.el6rhs
- vdsm-yajsonrpc-0:4.14.7.3-1.el6rhs
- glusterfs-0:3.6.0.42-1.el7
- glusterfs-api-0:3.6.0.42-1.el7
- glusterfs-api-devel-0:3.6.0.42-1.el7
- glusterfs-debuginfo-0:3.6.0.42-1.el7
- glusterfs-devel-0:3.6.0.42-1.el7
- glusterfs-fuse-0:3.6.0.42-1.el7
- glusterfs-libs-0:3.6.0.42-1.el7
- glusterfs-rdma-0:3.6.0.42-1.el7
|
|
refmap
via4
|
|
Last major update |
13-02-2023 - 00:41 |
Published |
27-03-2015 - 14:59 |
Last modified |
13-02-2023 - 00:41 |