5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.004 Low
EPSS
Percentile
75.1%
A flaw was found in the Ceph RGW configuration with Beast as the front end
handling client requests. An unauthenticated attacker could crash the Ceph
RGW server by sending valid HTTP headers and terminating the connection,
resulting in a remote denial of service for Ceph RGW clients.
Author | Note |
---|---|
sbeattie | only in beast rados gw frontend nautilus (14.x), mimic (13.x), and luminous (12.x), the latter as experimental feature. |
github.com/ceph/ceph/commit/6171399fdedd928b4249d135b4036e3de25079aa
github.com/ceph/ceph/pull/29967
launchpad.net/bugs/cve/CVE-2019-10222
nvd.nist.gov/vuln/detail/CVE-2019-10222
security-tracker.debian.org/tracker/CVE-2019-10222
ubuntu.com/security/notices/USN-4112-1
www.cve.org/CVERecord?id=CVE-2019-10222
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.004 Low
EPSS
Percentile
75.1%