| CVE-ID |
CVE-2018-1129
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| A flaw was found in the way signature calculation was handled by cephx
authentication protocol. An attacker having access to ceph cluster
network who is able to alter the message payload was able to bypass
signature checks done by cephx protocol. Ceph branches master, mimic,
luminous and jewel are believed to be vulnerable.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| Red Hat, Inc. |
| Date Entry Created |
| 20171204 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20171204) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|