Versio.io

CVE-2014-8177

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 21-08-2015 02:00
Last modified: - 21-08-2015 02:00
Total changes: - 13

Description

CVE-2014-8177 gluster-swift metadata constraints are not correctly enforced

Common Vulnerability Scoring System (CVSS)

AV:N/AC:L/Au:S/C:N/I:N/A:P
Low
Attack complexity
Network
Attack vector
Low
Availability
None
Confidentiality
None
Integrity
-
Privileges required
-
Scope
-
User interaction
4.0
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-16.el6
vendor=Red Hat Enterprise Linux AND product=storage AND version=3
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-16.el7
vendor=Red Hat Enterprise Linux AND product=storage AND version=3
AND
product=gdeploy-0 AND versionEndExcluding=1.0-12.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-16.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gluster-nagios-addons-0 AND versionEndExcluding=0.2.5-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gluster-nagios-common-0 AND versionEndExcluding=0.2.2-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gstatus-0 AND versionEndExcluding=0.65-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nagios-server-addons-0 AND versionEndExcluding=0.2.2-1.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nfs-ganesha-0 AND versionEndExcluding=2.2.0-9.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=openstack-swift-0 AND versionEndExcluding=1.13.1-6.el6ost
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=redhat-storage-server-0 AND versionEndExcluding=3.1.1.0-2.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=swiftonfile-0 AND versionEndExcluding=1.13.1-5.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=vdsm-0 AND versionEndExcluding=4.16.20-1.3.el6rhs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gdeploy-0 AND versionEndExcluding=1.0-12.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-16.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gluster-nagios-addons-0 AND versionEndExcluding=0.2.5-1.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gluster-nagios-common-0 AND versionEndExcluding=0.2.2-1.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=gstatus-0 AND versionEndExcluding=0.65-1.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nagios-server-addons-0 AND versionEndExcluding=0.2.2-1.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=nfs-ganesha-0 AND versionEndExcluding=2.2.0-9.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=openstack-swift-0 AND versionEndExcluding=1.13.1-6.el7ost
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=redhat-storage-server-0 AND versionEndExcluding=3.1.1.0-2.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=swiftonfile-0 AND versionEndExcluding=1.13.1-5.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=vdsm-0 AND versionEndExcluding=4.16.20-1.3.el7rhgs
vendor=Red Hat Enterprise Linux AND product=storage AND version=3.1
AND
product=glusterfs-0 AND versionEndExcluding=3.7.1-16.el7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
 

Reference

 


Keywords

REDHAT

 

CVE-2014-8177

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.