Description
It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1510-1 | glusterfs security update |
Debian DLA |
DLA-2806-1 | glusterfs security update |
EUVD |
EUVD-2018-2963 | It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution. |
Ubuntu USN |
USN-4770-1 | GlusterFS vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T07:54:34.923Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-10907
No data.
Status : Modified
Published: 2018-09-04T13:29:11.017
Modified: 2024-11-21T03:42:16.603
Link: CVE-2018-10907
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN