// For flags

CVE-2019-20423

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic due to the lack of validation for specific fields of packets sent by a client. The function target_handle_connect() mishandles a certain size value when a client connects to a server, because of an integer signedness error.

En el sistema de archivos de Lustre versiones anteriores versiones hasta 2.12.3, el módulo ptlrpc presenta un desbordamiento del búfer y un pánico debido a la falta de comprobación para campos de paquetes específicos enviados mediante un cliente. La función target_handle_connect() maneja inapropiadamente un determinado valor de tamaño cuando un cliente conecta con un servidor, debido a un error de la propiedad signedness de enteros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-27 CVE Reserved
  • 2020-01-27 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lustre
Search vendor "Lustre"
Lustre
Search vendor "Lustre" for product "Lustre"
< 2.12.3
Search vendor "Lustre" for product "Lustre" and version " < 2.12.3"
-
Affected