Vulnerability Details : CVE-2020-1700
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Vulnerability category: Denial of service
Products affected by CVE-2020-1700
- cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1700
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1700
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
Red Hat, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2020-1700
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2020-1700
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700
1791691 – (CVE-2020-1700) CVE-2020-1700 ceph: connection leak in the RGW Beast front-end permits a DoS against the RGW serverIssue Tracking;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html
[SECURITY] [DLA 3629-1] ceph security update
-
https://usn.ubuntu.com/4304-1/
USN-4304-1: Ceph vulnerability | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html
[security-announce] openSUSE-SU-2020:0187-1: moderate: Security update fMailing List;Third Party Advisory
Jump to