Lucene search

K
redhatcveRedhat.comRH:CVE-2018-10907
HistorySep 04, 2018 - 5:51 a.m.

CVE-2018-10907

2018-09-0405:51:34
redhat.com
access.redhat.com
16

0.003 Low

EPSS

Percentile

66.4%

It was found that glusterfs server is vulnerable to mulitple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using ‘alloca(3)’. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.

Mitigation

To limit exposure of gluster server nodes :

1. gluster server should be on LAN and not reachable from public networks.
2. Use gluster auth.allow and auth.reject.
3. Use TLS certificates to authenticate gluster clients.

caveat: This does not protect from attacks by authenticated gluster clients.