CVE-2018-10911
high-risk
Published 2018-09-04
A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
Do I need to act?
~
4.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (11)
References (22)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2607
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2608
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2892
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3242
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3470
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10911
Third Party Advisory
https://security.gentoo.org/glsa/201904-06
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2607
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2608
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2892
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3242
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3470
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10911
and 2 more references
50
/ 100
high-risk
Severity
26/34 · High
Exploitability
8/34 · Low
Exposure
16/34 · Moderate