Vulnerability Description
Splunk Web in Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.5, 6.3.x before 6.3.9, 6.2.x before 6.2.13, 6.1.x before 6.1.12, 6.0.x before 6.0.13, 5.0.x before 5.0.17 and Splunk Light versions before 6.5.2 allows remote authenticated users to cause a denial of service (daemon crash) via a crafted GET request, aka SPL-130279.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Splunk | Splunk | 5.0.0 |
Related Weaknesses (CWE)
References
- http://www.splunk.com/view/SP-CAAAPW8PatchVendor Advisory
- http://www.splunk.com/view/SP-CAAAPW8PatchVendor Advisory
FAQ
What is CVE-2017-5880?
CVE-2017-5880 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Splunk Web in Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.5, 6.3.x before 6.3.9, 6.2.x before 6.2.13, 6.1.x before 6.1.12, 6.0.x before 6.0.13, 5.0.x before 5.0.17 and Splunk Light...
How severe is CVE-2017-5880?
CVE-2017-5880 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5880?
Check the references section above for vendor advisories and patch information. Affected products include: Splunk Splunk.