It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
References
Link | Resource |
---|---|
https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1575866 | Issue Tracking Patch Third Party Advisory |
http://tracker.ceph.com/issues/24836 | Issue Tracking Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2179 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2177 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2274 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2261 | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4339 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/11/17/3 | |
http://www.openwall.com/lists/oss-security/2020/11/17/4 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-07-10 07:29
Updated : 2020-11-17 11:15
NVD link : CVE-2018-1128
Mitre link : CVE-2018-1128
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux
- enterprise_linux_workstation
- ceph
- ceph_storage_osd
- ceph_storage_mon
- ceph_storage
- enterprise_linux_server
opensuse
- leap
debian
- debian_linux