CVE-2018-14654
Published on: 10/31/2018 12:00:00 AM UTC
Last Modified on: 02/13/2023 04:51:00 AM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
- CVE-2018-14654 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
The Gluster Project - glusterfs version = through 4.1.4
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | HIGH | NONE |
CVSS2 Score: 8.5 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
CVE-2018-14654 - Red Hat Customer Portal | access.redhat.com text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
1631576 – (CVE-2018-14654) CVE-2018-14654 glusterfs: "features/index" translator can create arbitrary, empty files | bugzilla.redhat.com text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
GlusterFS: Multiple Vulnerabilities (GLSA 201904-06) — Gentoo security | security.gentoo.org text/html |
![]() |
[SECURITY] [DLA 2806-1] glusterfs security update | lists.debian.org text/html |
![]() |
Red Hat Customer Portal | Vendor Advisory access.redhat.com text/html |
![]() |
1631576 – (CVE-2018-14654) CVE-2018-14654 glusterfs: "features/index" translator can create arbitrary, empty files | Issue Tracking Vendor Advisory bugzilla.redhat.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Virtualization | 4.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Virtualization | 4.0 | All | All | All |
Application | Redhat | Gluster Storage | All | All | All | All |
Application | Redhat | Virtualization | 4.0 | All | All | All |
Application | Redhat | Virtualization Host | 4.0 | All | All | All |
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE