Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-10222


A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.


Published

2019-11-08T15:15:11.437

Last Modified

2024-11-21T04:18:41.467

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-755
  • Type: Primary
    CWE-755

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ceph ceph - Yes
Application redhat ceph_storage 3.0 Yes
Application redhat ceph_storage 3.3 Yes
Operating System fedoraproject fedora 30 Yes
Operating System fedoraproject fedora 31 Yes

References