Vulnerabilities
Vulnerable Software
Gluster:  >> Glusterfs  >> 4.0.2  Security Vulnerabilities
It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.
CVSS Score
5.3
EPSS Score
0.008
Published
2018-09-04
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
CVSS Score
6.6
EPSS Score
0.003
Published
2018-06-20
glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.
CVSS Score
8.0
EPSS Score
0.031
Published
2018-04-25


Contact Us

Shodan ® - All rights reserved