CVE Vulnerabilities

CVE-2016-8626

NULL Pointer Dereference

Published: Jul 31, 2018 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:C
RedHat/V2
6.3 MODERATE
AV:N/AC:M/Au:S/C:N/I:N/A:C
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
CephRedhat*0.94.3.9-8 (excluding)
Red Hat Ceph Storage 1.3 for Red Hat Enterprise Linux 7RedHatceph-1:0.94.9-8.el7cp*
Red Hat Ceph Storage 1.3 for UbuntuRedHat*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatcalamari-server-0:1.4.9-1.el7cp*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatceph-1:10.2.3-13.el7cp*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatceph-deploy-0:1.5.36-20.el7cp*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatceph-iscsi-config-0:1.5-1.el7cp*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatceph-iscsi-tools-0:1.1-1.el7cp*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatlibntirpc-0:1.4.1-1.el7*
Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7RedHatnfs-ganesha-0:2.4.0-3.el7cp*
Red Hat Ceph Storage 2 for UbuntuRedHat*
CephUbuntuesm-infra-legacy/trusty*
CephUbuntuprecise*
CephUbuntutrusty*
CephUbuntutrusty/esm*

Potential Mitigations

References