Vulnerability Details : CVE-2014-3619
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.
Vulnerability category: Denial of service
Products affected by CVE-2014-3619
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:gluster:glusterfs:3.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3619
1.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3619
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-3619
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3619
-
http://lists.opensuse.org/opensuse-updates/2015-03/msg00031.html
openSUSE-SU-2015:0473-1: moderate: Security update for glusterfs
-
http://advisories.mageia.org/MGASA-2015-0145.html
Mageia Advisory: MGASA-2015-0145 - Updated glusterfs packages fix security vulnerabilities
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:211
mandriva.com
-
http://review.gluster.org/#/c/8662/4
Change I5583e578: socket: Fixed parsing RPC records containing multi fragments | review.gluster Code Review
-
http://lists.opensuse.org/opensuse-updates/2015-03/msg00056.html
openSUSE-SU-2015:0528-1: moderate: Security update for glusterfs
-
https://bugzilla.redhat.com/show_bug.cgi?id=1138145
1138145 – (CVE-2014-3619) CVE-2014-3619 glusterfs: fragment header infinite loop DoS
Jump to