CVE-2018-11793
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.
Al analizar una carga útil JSON con estructuras JSON profundamente anidadas, el analizador en Apache Mesos, en sus versiones anteriores a las 1.4x, desde la 1.4.0 hasta la 1.4.0, desde la 1.5.0 hasta la 1.5.1, desde la 1.6.0 hasta la 1.6.1 y en la 1.7.0, podría realizar una sobrecarga de la pila debido a una recursión infinita. Por lo tanto, un actor malicioso podría provocar una denegación de servicio (DoS) de los nodos Maestro de Mesos, haciendo que el clúster controlado por Mesos no funcione.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-05 CVE Reserved
- 2019-03-05 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107281 | Third Party Advisory | |
https://lists.apache.org/thread.html/9be975c53e5ad612c7e0af39f5b88837fbfbc32108e587d3d8499844%40%3Cdev.mesos.apache.org%3E | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.4.0 < 1.4.3 Search vendor "Apache" for product "Mesos" and version " >= 1.4.0 < 1.4.3" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.5.0 < 1.5.2 Search vendor "Apache" for product "Mesos" and version " >= 1.5.0 < 1.5.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.6.0 < 1.6.2 Search vendor "Apache" for product "Mesos" and version " >= 1.6.0 < 1.6.2" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | >= 1.7.0 < 1.7.1 Search vendor "Apache" for product "Mesos" and version " >= 1.7.0 < 1.7.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.4.0 Search vendor "Apache" for product "Mesos" and version "1.4.0" | rc1 |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.4.0 Search vendor "Apache" for product "Mesos" and version "1.4.0" | rc2 |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.4.0 Search vendor "Apache" for product "Mesos" and version "1.4.0" | rc3 |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.4.0 Search vendor "Apache" for product "Mesos" and version "1.4.0" | rc4 |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.4.0 Search vendor "Apache" for product "Mesos" and version "1.4.0" | rc5 |
Affected
| ||||||
Apache Search vendor "Apache" | Mesos Search vendor "Apache" for product "Mesos" | 1.8.0 Search vendor "Apache" for product "Mesos" and version "1.8.0" | dev |
Affected
|