CVE Vulnerabilities

CVE-2020-8551

Memory Allocation with Excessive Size Value

Published: Mar 27, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
3.3 LOW
AV:A/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.

Weakness

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.

Affected Software

NameVendorStart VersionEnd Version
KubernetesKubernetes1.15.0 (including)1.15.9 (including)
KubernetesKubernetes1.16.0 (including)1.16.6 (including)
KubernetesKubernetes1.17.0 (including)1.17.2 (including)
Red Hat OpenShift Container Platform 4.3RedHatopenshift-0:4.3.10-202003300855.git.0.da48c1d.el8*
Red Hat OpenShift Container Platform 4.3RedHatopenshift4/ose-hyperkube:v4.3.10-202003311925*

Potential Mitigations

References