CVE-2018-10911

Current Description

A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.

Basic Data

PublishedSeptember 04, 2018
Last ModifiedApril 02, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-502
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 3 - Attack VectorNETWORK
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredNONE
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactNONE
CVSS 3 - Availability ImpactNONE
CVSS 3 - Base Score7.5
CVSS 3 - Base SeverityHIGH
Exploitability Score3.9
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGlusterGlusterfs********3.12.03.12.14
    2.3ApplicationGlusterGlusterfs********4.1.04.1.4
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop6.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server6.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Workstation6.0*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******
    2.3OSRedhatVirtualization4.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux8.0*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 8.0
Gluster Glusterfs *
Redhat Enterprise Linux Workstation 6.0, 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 6.0, 7.0
Redhat Virtualization 4.0
Redhat Enterprise Linux Server 6.0, 7.0

References

NameSourceURLTags
openSUSE-SU-2020:0079http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.htmlSUSE
RHSA-2018:2607https://access.redhat.com/errata/RHSA-2018:2607REDHATThird Party Advisory
RHSA-2018:2608https://access.redhat.com/errata/RHSA-2018:2608REDHATThird Party Advisory
RHSA-2018:2892https://access.redhat.com/errata/RHSA-2018:2892REDHATThird Party Advisory
RHSA-2018:3242https://access.redhat.com/errata/RHSA-2018:3242REDHATThird Party Advisory
RHSA-2018:3470https://access.redhat.com/errata/RHSA-2018:3470REDHATThird Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10911https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10911CONFIRMIssue Tracking Third Party Advisory
[debian-lts-announce] 20180920 [SECURITY] [DLA 1510-1] glusterfs security updatehttps://lists.debian.org/debian-lts-announce/2018/09/msg00021.htmlMLISTMailing List Third Party Advisory
https://review.gluster.org/#/c/glusterfs/+/21067/https://review.gluster.org/#/c/glusterfs/+/21067/CONFIRMPatch Vendor Advisory
GLSA-201904-06https://security.gentoo.org/glsa/201904-06GENTOO