Vulnerabilities
Vulnerable Software
Corosync:  >> Corosync  Security Vulnerabilities
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration.
CVSS Score
8.2
EPSS Score
0.001
Published
2026-04-01
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
CVSS Score
7.5
EPSS Score
0.001
Published
2026-04-01
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
CVSS Score
9.0
EPSS Score
0.003
Published
2025-03-22
corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
CVSS Score
7.5
EPSS Score
0.003
Published
2018-04-12
The init_nss_hash function in exec/totemcrypto.c in Corosync 2.0 before 2.3 does not properly initialize the HMAC key, which allows remote attackers to cause a denial of service (crash) via a crafted packet.
CVSS Score
5.0
EPSS Score
0.009
Published
2014-06-06


Contact Us

Shodan ® - All rights reserved