Vulnerability CVE-2018-7262: Information

Description

In Ceph before 12.2.3 and 13.x through 13.0.1, the rgw_civetweb.cc RGWCivetWeb::init_env function in radosgw doesn't handle malformed HTTP headers properly, allowing for denial of service.

Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: March 20, 2018
Modified: Nov. 7, 2023
Error type identifier: CWE-476

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://github.com/ceph/ceph/pull/20488
  • Issue Tracking
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1546611
  • Issue Tracking
http://tracker.ceph.com/issues/23039
  • Issue Tracking
  • Vendor Advisory
RHSA-2018:0548
  • Third Party Advisory
RHSA-2018:0546
  • Third Party Advisory
FEDORA-2018-ed907ef9a0
      1. Configuration 1

        cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
        End excliding
        12.2.3

        cpe:2.3:a:redhat:ceph:13.0.0:*:*:*:*:*:*:*

        cpe:2.3:a:redhat:ceph:13.0.1:*:*:*:*:*:*:*

        Configuration 2

        cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*