Lucene search

K
cvelistDwfCVELIST:CVE-2019-1002100
HistoryApr 01, 2019 - 2:14 p.m.

CVE-2019-1002100

2019-04-0114:14:27
dwf
www.cve.org

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.7%

In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g. kubectl patch --type json or "Content-Type: application/json-patch+json") that consumes excessive resources while processing, causing a Denial of Service on the API Server.

CNA Affected

[
  {
    "product": "Kubernetes",
    "vendor": "Kubernetes",
    "versions": [
      {
        "status": "affected",
        "version": "v1.0.x"
      },
      {
        "status": "affected",
        "version": "v1.1.x"
      },
      {
        "status": "affected",
        "version": "v1.2.x"
      },
      {
        "status": "affected",
        "version": "v1.3.x"
      },
      {
        "status": "affected",
        "version": "v1.4.x"
      },
      {
        "status": "affected",
        "version": "v1.5.x"
      },
      {
        "status": "affected",
        "version": "v1.6.x"
      },
      {
        "status": "affected",
        "version": "v1.7.x"
      },
      {
        "status": "affected",
        "version": "v1.8.x"
      },
      {
        "status": "affected",
        "version": "v1.9.x"
      },
      {
        "status": "affected",
        "version": "v1.10.x"
      },
      {
        "lessThan": "v1.11.8",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "v1.12.6",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThan": "v1.13.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.7%