7 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability. Etcd v3.5.4 permite a atacantes remotos causar una denegación de servicio a través de la función PageWriter.write en pagewriter.go. NOTA: la posición del proveedor es que esto no es una vulnerabilidad. • https://github.com/etcd-io/etcd/pull/14022 https://github.com/etcd-io/etcd/pull/14452 https://github.com/golang/vulndb/issues/2016#issuecomment-1698677762 https://go-review.googlesource.com/c/vulndb/+/524456 https://go-review.googlesource.com/c/vulndb/+/524456/2/data/excluded/GO-2023-2016.yaml • CWE-787: Out-of-bounds Write •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.26 and 3.5.9, the LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC). Versions 3.4.26 and 3.5.9 fix this issue. There are no known workarounds. • https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md https://github.com/etcd-io/etcd/pull/15656 https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298 https://access.redhat.com/security/cve/CVE-2023-32082 https://bugzilla.redhat.com/show_bug.cgi?id=2208131 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function. A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. • http://etcd.com https://github.com/etcd-io/etcd https://github.com/etcd-io/etcd/pull/15648 https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png https://access.redhat.com/security/cve/CVE-2021-28235 https://bugzilla.redhat.com/show_bug.cgi?id=2184441 • CWE-287: Improper Authentication •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

In etcd before versions 3.3.23 and 3.4.10, it is possible to have an entry index greater then the number of entries in the ReadAll method in wal/wal.go. This could cause issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant could go down from a runtime panic when reading the entry. En etcd versiones anteriores a 3.3.23 y 3.4.10, es posible tener un índice de entrada mayor que el número de entradas en el método ReadAll en el archivo wal/wal.go. Esto podría causar problemas cuando las entradas de WAL se leen durante el consenso, ya que un participante arbitrario del consenso etcd, podría descender a partir de un pánico en tiempo de ejecución cuando lee la entrada A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. • https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP https://access.redhat.com/security/cve/CVE-2020-15112 https://bugzilla.redhat.com/show_bug.cgi?id=1868872 • CWE-20: Improper Input Validation CWE-129: Improper Validation of Array Index CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 0

In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. A possible workaround is to ensure the directories have the desired permission (700). En etcd versiones anteriores a 3.3.23 y 3.4.10, determinadas rutas de directorio son creadas (directorio de datos de etcd y la ruta de directorio cuando se proporcionaba para generar automáticamente certificados autofirmados para conexiones TLS con clientes) con permisos de acceso restringido (700) usando os.MkdirAll. Esta función no realiza ninguna comprobación de permisos cuando una ruta de directorio dada ya existe. • https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP https://access.redhat.com/security/cve/CVE-2020-15113 https://bugzilla.redhat.com/show_bug.cgi?id=1868870 • CWE-281: Improper Preservation of Permissions CWE-285: Improper Authorization •