Vulnerability Details : CVE-2014-6416
Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2014-6416
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
Threat overview for CVE-2014-6416
Top countries where our scanners detected CVE-2014-6416
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2014-6416 13,529
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-6416!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-6416
3.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-6416
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-6416
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-6416
-
http://www.ubuntu.com/usn/USN-2376-1
USN-2376-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8
libceph: do not hard code max auth ticket len · torvalds/linux@c27a3e4 · GitHubExploit;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2377-1
USN-2377-1: Linux kernel (OMAP4) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://tracker.ceph.com/issues/8979
Bug #8979: GPF kernel panics - auth? - Linux kernel client - CephBroken Link
-
http://www.securityfocus.com/bid/69805
Linux Kernel 'ceph/auth_x.c' Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2378-1
USN-2378-1: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
Exploit;Vendor Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c27a3e4d667fdcad3db7b104f75659478e0c68d8
kernel/git/torvalds/linux.git - Linux kernel source treeExploit;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2014/09/15/7
oss-security - Re: CVE Request: libceph auth token overflow / Linux kernelExploit;Mailing List
-
https://bugzilla.redhat.com/show_bug.cgi?id=1142060
1142060 – (CVE-2014-6416) CVE-2014-6416 kernel: libceph auth token buffer overflowIssue Tracking;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2379-1
USN-2379-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
Jump to