{ "id": "CVE-2015-7944", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-18T17:29:01.170", "lastModified": "2021-09-08T17:07:29.173", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The RESTful control interface (aka RAPI or ganeti-rapi) in Ganeti before 2.9.7, 2.10.x before 2.10.8, 2.11.x before 2.11.8, 2.12.x before 2.12.6, 2.13.x before 2.13.3, 2.14.x before 2.14.2, and 2.15.x before 2.15.2, when used in SSL mode, allows remote attackers to cause a denial of service (resource consumption) via SSL parameter renegotiation." }, { "lang": "es", "value": "La interfaz de control RESTful (tambi\u00e9n conocida como RAPI o ganeti-rapi) en Ganeti en versiones anteriores a la 2.9.7, 2.10.x en versiones anteriores a la 2.10.8, 2.11.x en versiones anteriores a la 2.11.8, 2.12.x en versiones anteriores a la 2.12.6, 2.13.x en versiones anteriores a la 2.13.3, 2.14.x en versiones anteriores a la 2.14.2, y 2.15.x en versiones anteriores a la 2.15.2, cuando se emplea en modo SSL, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (consumo de recursos) mediante la renegociaci\u00f3n de par\u00e1metros SSL." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": true, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-399" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.9.6", "matchCriteriaId": "2AFB2A29-9615-40BE-A9D2-5ED10CAD25F5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F66B137A-661B-4A33-B42D-36086C5CE25F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CD3870AD-723B-4EE6-B86F-759126E06F21" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0A8CBB01-AA66-4262-A3DF-26DED8E1B243" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4F6F8F9E-2942-45A9-A3DF-7A2B3392110C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E4946A0E-7FAF-49D1-85B7-5CE8A31B9F3D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C0A6331-D11E-4062-8883-3B0A8661CE20" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "74F1C8B8-9A50-45E5-8CCA-425199DEB994" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "1136452D-0A89-4E27-B6FA-F08236885FFF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "22D6DAB2-3455-4532-8FC9-FB04DD71B9B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "F038EE62-9261-4D28-BC3C-8692FCA87115" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "35ECC2AA-C63F-4794-A62D-B78ED6F82DD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "27853A40-4920-4EAD-B7D7-94F21984F0F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "773D755E-7E1E-460E-A753-9AB5AA67759E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "4B85FCE9-38B9-437D-AA42-A5C258A1D785" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "4806E38C-C58B-4C41-A2BB-D6ABB2A392C1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB162407-8069-43A6-8F93-492E6EBF17C2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "997067C6-82FC-4917-A16C-3E8D7F1DFC77" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "15071497-2E59-4EA1-ACDC-5D6AC2703226" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "9FA19307-8A03-4161-9A15-BA8C7FD83F3B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "E9A1261E-DC4D-49DA-9667-738D7B50C4AB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "53A21A0F-1087-4C50-A9BE-1401C6D2E353" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.11.7:*:*:*:*:*:*:*", "matchCriteriaId": "5AC8EDA6-66FA-4B10-93BD-75DBB1936890" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF9320F7-7814-4C8D-8B0D-E3C561F241AE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CA3195D4-3F38-4233-93BD-9C7B0BD81DEF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E1CA193-AB44-4FE1-89EB-F44B4BAE5E8C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "52293A00-F1A4-4855-B9D3-231CC3F44F14" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "A613785D-35E9-4D04-AA53-ECE74D19416D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "0DA3E104-B4F1-4D1F-96EC-3920AA3D947B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "94BE58DA-8FEB-469A-9357-336EEA5E4C69" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "4814E6BD-E537-4ED5-9E2D-C6C93967B481" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E7081B6-E36F-460D-BD6A-A58190046671" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "91E4AA14-555D-46F1-BFC6-1E7DC241B146" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "79DF3293-D53E-4BA0-AB1D-1F60DDEE4657" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "43DC4920-7456-40C3-8DB3-0131FA8B1E62" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "26181A20-ACF6-4EB4-869D-6B26B7C41783" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "BF9B2609-E1A3-4835-9F10-A36D377597F3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "9ED4BD26-FCF7-4D80-A303-A265C8C0E5C1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "3F1246E6-E244-4F8A-AB57-2463BDD83549" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "3009D3B0-1890-4F9D-8B43-29CD245EBCCE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CEB2AE3B-D220-40CA-8945-0D8B17152D39" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "913E97F4-4D88-445D-B0D4-6915F0744793" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "344982DF-20A4-4DB7-A3B7-ACC8A0BEAE32" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "B36F975B-6F6A-43AE-9588-A844A340C0F7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "D2F9BF24-60B1-4334-9082-8F1F251B381A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B1A19969-A0E2-4FFB-A4AC-AC330F3C89F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:spi-inc:ganeti:2.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "480C9B88-DC61-4586-B714-69751FC233C5" } ] } ] } ], "references": [ { "url": "http://docs.ganeti.org/ganeti/2.10/html/news.html#version-2-10-8", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://docs.ganeti.org/ganeti/2.11/html/news.html#version-2-11-8", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://docs.ganeti.org/ganeti/2.12/html/news.html#version-2-12.6", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://docs.ganeti.org/ganeti/2.13/html/news.html#version-2-13-3", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://docs.ganeti.org/ganeti/2.14/html/news.html#version-2-14-2", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://docs.ganeti.org/ganeti/2.15/html/news.html#version-2-15-2", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://docs.ganeti.org/ganeti/2.9/html/news.html#version-2-9-7", "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "http://packetstormsecurity.com/files/135101/Ganeti-Leaked-Secret-Denial-Of-Service.html", "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.debian.org/security/2016/dsa-3431", "source": "cve@mitre.org" }, { "url": "http://www.ocert.org/advisories/ocert-2015-012.html", "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.exploit-db.com/exploits/39169/", "source": "cve@mitre.org" } ] }