Vulnerability Description
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Opensuse | 13.1 |
| Gluster | Glusterfs | 3.5 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2015-0145.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00056.html
- http://review.gluster.org/#/c/8662/4
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:211
- https://bugzilla.redhat.com/show_bug.cgi?id=1138145
- http://advisories.mageia.org/MGASA-2015-0145.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00056.html
- http://review.gluster.org/#/c/8662/4
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:211
- https://bugzilla.redhat.com/show_bug.cgi?id=1138145
FAQ
What is CVE-2014-3619?
CVE-2014-3619 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.
How severe is CVE-2014-3619?
CVE-2014-3619 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3619?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Gluster Glusterfs.