7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
74.9%
A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | 3.10-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.11-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.12-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.13-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.14-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.16-community | noarch | ceph | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.17-community | noarch | ceph16 | < 14.2.3-r0 | UNKNOWN |
Alpine | 3.18-community | noarch | ceph16 | < 14.2.3-r0 | UNKNOWN |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
74.9%