Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-10222
HistoryAug 28, 2019 - 12:00 a.m.

CVE-2019-10222

2019-08-2800:00:00
ubuntu.com
ubuntu.com
15

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

75.1%

A flaw was found in the Ceph RGW configuration with Beast as the front end
handling client requests. An unauthenticated attacker could crash the Ceph
RGW server by sending valid HTTP headers and terminating the connection,
resulting in a remote denial of service for Ceph RGW clients.

Bugs

Notes

Author Note
sbeattie only in beast rados gw frontend nautilus (14.x), mimic (13.x), and luminous (12.x), the latter as experimental feature.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchceph< 12.2.12-0ubuntu0.18.04.2UNKNOWN
ubuntu19.04noarchceph< 13.2.6-0ubuntu0.19.04.3UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

75.1%