Lucene search

K
cve[email protected]CVE-2019-1002100
HistoryApr 01, 2019 - 2:29 p.m.

CVE-2019-1002100

2019-04-0114:29:00
CWE-770
web.nvd.nist.gov
62
2
cve-2019-1002100
kubernetes
dos
patch requests
api server

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.7%

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g. kubectl patch --type json or "Content-Type: application/json-patch+json") that consumes excessive resources while processing, causing a Denial of Service on the API Server.

Affected configurations

NVD
Node
kuberneteskubernetesRange<1.11.8
OR
kuberneteskubernetesRange1.12.01.12.6
OR
kuberneteskubernetesRange1.13.01.13.4
Node
redhatopenshift_container_platformMatch3.10
OR
redhatopenshift_container_platformMatch3.11

CNA Affected

[
  {
    "product": "Kubernetes",
    "vendor": "Kubernetes",
    "versions": [
      {
        "status": "affected",
        "version": "v1.0.x"
      },
      {
        "status": "affected",
        "version": "v1.1.x"
      },
      {
        "status": "affected",
        "version": "v1.2.x"
      },
      {
        "status": "affected",
        "version": "v1.3.x"
      },
      {
        "status": "affected",
        "version": "v1.4.x"
      },
      {
        "status": "affected",
        "version": "v1.5.x"
      },
      {
        "status": "affected",
        "version": "v1.6.x"
      },
      {
        "status": "affected",
        "version": "v1.7.x"
      },
      {
        "status": "affected",
        "version": "v1.8.x"
      },
      {
        "status": "affected",
        "version": "v1.9.x"
      },
      {
        "status": "affected",
        "version": "v1.10.x"
      },
      {
        "lessThan": "v1.11.8",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "v1.12.6",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "v1.13.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.7%