2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2023-0056" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2023-03-23T21:15:19.087" ,
"lastModified" : "2023-04-03T17:42:52.613" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-400"
}
]
} ,
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-400"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:haproxy:haproxy:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68833392-03CF-4C78-B499-EB2B8C1335D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4E37E1B3-6F68-4502-85D6-68333643BDFF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "749804DA-4B27-492A-9ABA-6BB562A6B3AC"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
2024-05-19 02:03:31 +00:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
} ,
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40449571-22F8-44FA-B57B-B43F71AB25E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "948DF974-D58C-41D3-9024-1C7D260D822F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2127E592-F973-4244-9793-680736EC5313"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "608FBE62-5A35-4C7A-BBC7-E0D05E09008B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:arm64:*" ,
"matchCriteriaId" : "4E5177BE-F2A0-4148-AA26-E1C8D3B75D13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:arm64:*" ,
"matchCriteriaId" : "1E5CB8B9-F3B7-478E-94EA-705BDBE902D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:arm64:*" ,
"matchCriteriaId" : "36DBD95A-D9C8-47CB-AD0E-F37255E237EB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
2024-05-19 02:03:31 +00:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
}
]
} ,
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0595C9F8-9C7A-4FC1-B7EE-52978A1B1E93"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91EE3858-A648-44B4-B282-8F808D88D3B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "54E24055-813B-4E6D-94B7-FAD5F78B8537"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E58526FB-522F-4AAC-B03C-9CAB443D0CFF"
}
]
2024-05-19 02:03:31 +00:00
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
}
]
2024-05-19 02:03:31 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA983F8C-3A06-450A-AEFF-9429DE9A3454"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1104A2D0-B813-41B0-A6FB-677A3FC249BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B2EF9F6-CE0A-48FA-87E5-77F94363B540"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22DFC1BF-2EC4-4102-97D0-BC9F75C94F71"
}
]
2024-05-19 02:03:31 +00:00
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
}
]
2024-05-19 02:03:31 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40449571-22F8-44FA-B57B-B43F71AB25E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "948DF974-D58C-41D3-9024-1C7D260D822F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2127E592-F973-4244-9793-680736EC5313"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "608FBE62-5A35-4C7A-BBC7-E0D05E09008B"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://access.redhat.com/security/cve/CVE-2023-0056" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
}
]
}